Chapter 4: Access Control, Authentication, and Authorization Flashcards
Identification
Finding out who someone is
Authentication
Verifying identification
Out-of-band Authentication
The system you are authenticating gets info from public records and asks you questions to help authenticate you.
SFA
Single Factor Authentication
Mutual Authentication
Multiple parties authenticating each other
Layered Security/Defense in Depth
You should implement multiple layers of security
Operational Security
- Focuses on how an organization achieves its goals.
- Everything not related to design or physical security.
Security Token
- Similar to certificates, it is a small piece of data that holds a sliver of info about the user.
- Authentication system creates the token every time a user connects or when a session begins, and deletes it when they end.
Federation
A collection of computer networks that agree on standards of operation.
Federated Identity
Allows a user to have a single identity that they can use across different business units or businesses
Transitive Access
If A trusts B and B trusts C then A trusts C
Shiva Password Authentication Protocol (SPAP)
Like PAP, but encrypts username and password
Challenge Handshake Authentication Protocol (CHAP)
- Designed to stop man-in-the-middle attacks
- Periodically asks the client for authentication
Time-Based One-Time Password (TOTP)
Uses a time-based factor to create unique passwords
Usual minimum password length
8 characters
Generic Account
An account that is shared
SLIP
One of the first remote authentication protocols, which should not be used now
PPP
- No data security, but uses CHAP
- Authentication handled by Link Control Protocol (LCP)
- Encapsulates network traffic with Network Control Protocol (NCP)
RADIUS server
Allows authentication of remote and other network connections
TACACS+
Similar to RADIUS, authentication