Chapter 4 Flashcards

1
Q

Access Control

A

allowing the correct users onto the system.

131

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identification versus Authentication

A

Authentication is a step beyond identification. It requires verifying who that person is… for example a login and a password.
131

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 Factors of authentication

A

Something you know (PIN, password, etc)
Something you have (smart card, token, etc)
Something you are (biometrics)
Something you do (finger pattern in phone)
Somewhere you are (in the correct country)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mutual Authentication

A

When two or more parties authenticate each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layered Security vs Defense in Depth

A

They’re the same thing!

it means don’t rely to heavily on one form of authentication. Instead implement multiple layers of security. IE Multiple locked doors to get to the server
133

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operational Security

A

How an organization achieves its goals. Includes network access control, authentication, and security topologies after the network installation is complete
134

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Tokens

A

ID and authenticate a user. They contain certain rights and access priviledges of the token bearer.

in other words a small piece of data that holds info about the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Federation

A

A collection of computer networks that agree on standards of operation including security standards.

Outside of computers: Dominos and papa johns both let you order online and deliver the pizza to you
135

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Federated Identity

A

Linking a user’s ID with their privileges in a manner that can be used across business boundaries
135

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transitive Access

A

If A = B and B = C then A = C
Basically one group trusts you because another group that they trust trusts you.

It’s easier but all of this trusting makes the trusters suceptable to hacking
136

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PAP

A

Password Authentication Protocol

Sends the username and password to the authentication server in plain text
139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SPAP

A

Shiva Password Authentication Protocol

Replaced PAP. Encrypts the username and password
139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CHAP

A

Challenge Handshake Authentication Protocol

designed to stop man-in-the-middle attacks. During the initial authentication, the connecting machine is asked to generate a random number (usually a hash) and send it to the server
139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TOTP

A

Time-Based One-Time Password

algorithm uses a time-based factor to create unique passwords
139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HOTP

A

HMAC-Based One-Time Password

algorithm based on using a Hash Message Authentication Code algorithm.
139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAML

A

Security Assertion Markup Language

Open standard based on XML. Often used to identify someone coming through an ISP
147

17
Q

TACACS

A

Terminal Access Controller Access Control System

client/server-oriented environment and it operates in a manner similar to RADIUS
146

18
Q

XTACACS versus TACACS+

A

Extended Terminal Access Controller Access Control System

Added combined authentication and authorization with logging to enable auditing

TACACS+

allows credentials to be accepted from multiple methods including Kerberos.
146

19
Q

Kerberos

A

Authentication protocol named after three headed dog in hades

Allows a single sign on to a distributed network. Uses a Key distribution center
148

20
Q

MAC

A

Mandatory Access Control

relatively inflexible method for how information access is permitted. All access capabilities are predefined. Users can’t share data unless given the right to by administrators

21
Q

DAC

A

Discretionary Access Control

Some flexibility regarding how information is accessed. Shares information dynamically with other users. Runs the risk of unauthorized disclosure

22
Q

RBAC

hint has an “o”

A

Role-Based Access Control

models must access based on established role in an organization. Instead of granting users rights, it grants groups rights. 150

23
Q

RBAC

hint has a “u”

A

Rule-Based Access Control

Uses preconfigured security security policies to make all decisions

  • Deny all but those who specifically appear in a list (allow list)
  • Deny only those who specifically appear in the list (deny list) 150
24
Q

Smart Cards

A

Generally used for access control and security purposes. Card usually contains a small amount of memory that can be used to store permissions and access information

25
Q

Flood Guard

A

protective feature built into many firewalls that allows the administrator to tweak the tolerance for unanswered login attacks.

Reduces likelihood of a DoS attacks

26
Q

Loop protection

A

is a similar to flood guard but works in layer 2

27
Q

Network Bridging

A

When a device has more than one network adapter card installed and the opportunity presents itself for a user on one of the networks to which the device is attached to jump to each other

28
Q

Log Analysis

A

crucial to identifying problems that occur related to security. As an administrator you have the ability to turn logging at many different locations and levels

29
Q

TOS

A

Trusted Operating System

Any operating system that meets the government’s requirements for security. The most common set of standards for security is Common Criteria