Chapter 4 - Access Control, Authentication and Authorization Flashcards
Rene
What is the mechanism of verifying that identification?
page 131
Authentication
Rene
Authentication systems or methods are based on one or more of which 5 factors
page 131
Something you know, such as a password or PIN
Something you have, such as a smart card, token or ID device
Something you are, such as your fingerprints or retinal pattern (often called biometrics)
Something you do, such as an action you must take to complete authentication
Somewhere you are (this is based on geolocation)
Rene
Whenever two or more parties authenticate each other, it is know as _______?
page 132
Mutual Authentication
Rene
When two or more access methods are included as part of the authenticate process is known as _______?
page 133
Multi-factor Authentication
Rene
A system that uses smart cards and passwords is referred to as a _________________?
page 133
Two-Factor Authentication
Rene
What are similar to certificates in that they are used to identify and authenticate the user, contain the rights and access privileges to the bearer, and at the completion of a session is destroyed?
page 135
Token
Rene
What is collection of computer networks that agree on standards of operation such as security standards?
page 135
Federations
Rene
What the 5 Authentication Protocols?
page 139
PAP (Password Authentication Protocol)
SPAP (Shiva Password Authentication Protocol)
CHAP (Challenge Handshake Authentication Protocol)
TOTP (Time-Base One-Time Password)
HOTP (HMAC-Based One-Time Password)
Rene
What must you do to configure the router securely?
page 160
Change the default password
Walk through the advanced settings
Keep the firmware upgraded
Rene
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) requires product developers to use good design practices?
page 159
EAL 2
Rene
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) requires conscientious development moderate levels of security?
Page 159
EAL 3
Rene
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) is primarily used when the user wants assurance that the system will operate correctly but threats to security aren’t viewed as serious?
page 159
EAL 1
Rene
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) requires positive security engineering based on good commercial development practices?
page 159
EAL 4
Rene
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) is intended to ensure that security engineering has been implemented in a product from the early design phases.
page 159
EAL 5
Rene
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) provides high level of assurance of specialized security engineering?
page 160
EAL 6