Chapter 7 - Identity and Access Management Flashcards

1
Q

What is a Appending in password management?

A

It is adding letters, punctuation, and a number in that exact order - Password cracking programs look for these patterns, so the password is relatively weak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Replacing in password management?

A

It is when a user uses predictable patters, i.e. a zero for the letter “o” and etc - Password cracking programs look for these patterns, so the password is relatively weak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a Password work?

A

1) Username and Password is created and sent to server
2) Server scrambles password to create digest (fixed string of characters by a hash algorithm)
3) Username and Password is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a password manager?

A

Software application or online website that stores user passwords along with login information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a password vault or vaulting?

A

Enterprise-level system for storing user password credentials in a highly protected database (vault) on the organization’s network, can also require users to document a valid reason for accessing a particular resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a security key?

A

Dongle inserted into a USB port, lightning cable, or a smartphone using NFC, this key contains all the necessary cryptographic info to authenticate the user - does not generate OTPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is credential stuffing?

A

Threat actors, with a stolen password digest, injects the username and password on any site hoping for repeated credentials
To protect, do not use the same passwords over multiple sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are keystroke dynamics?

A

A type of behavioral biometrics that recognizes a user’s unique typing rhythm, requires no specialized hardware and no additional steps beyond entering a username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ABAC?

A

Attribute-Based Access Control - access control scheme that uses flexible policies that can combine attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is RBAC?

A

Role-Based Access Control - access control scheme that is considered a more “real-world” access control that is based on a user’s job function within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is MAC?

A

Mandatory Access Control - access control scheme that is the most restrictive by assigning users’ access controls strictly according to the custodian’s desires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Key Stretching?

A

A more secure approach for creating password digests, uses a specialized password hash algorithm that is intentionally designed to be slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DAC?

A

Discretionary Access Control, access control scheme that is least restrictive, giving an owner total control over objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Argon2?

A

A key stretching algorithm that can be configured based on several different parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are sound password practices?

A

Minimum password length
Password Age
Reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should provisioning include about password management?

A

(Initially setting up user accounts) should include policies that address password best practices (aka minimum length, age, and reuse)

16
Q

What is password spraying?

A

Takes one or a small number of commonly used passwords and then uses this same password when trying to log into several different user accounts. Because this targeted guess is spread across many different accounts, it is less likely to raise any alarms or lock out the user account from too many failed password attempts.

17
Q

What does identity cover in IAM?

A

Covers both identity proofing and authentication.

18
Q

What is Salting?

A

Consists of a random string used in hash algorithms

19
Q

What is Peppering?

A

Create the message digest as normal but then also encrypt it with a symmetrical encryption key before storing it

20
Q

What is a passkey?

A

Refer to various methods for storing authenticating information in hardware, combine multifactor authentication into a single package that is managed by the device’s OS

21
Q

What is physiological biometrics?

A

uses the way in which a body part uniquely functions in an individual

22
Q

What is cognitive biometrics?

A

related to the perception, thought process, and understanding of the user

23
Q

What does “Something you exhibit” mean?

A

Often linked to specialized attributes, may include neurological traits that can be identified by specialized medical equipment, ex. a certain genetic characteristic(s)

24
Q

What is an ACL?

A

Access Control List - Is a set of permissions (authorizations) that is attached to an object