Chapter 8 Identity and Password Management Flashcards

1
Q

Identities

A

Set of claims made about a subject. Subject can be a person, application, device, organization, etc. Identities are linked to information about the subject. This info includes ATTRIBUTES, or information about the subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attributes vs. Traits

A

Attributes are changeable things like title or address. Traits are inherent, like place of birth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSH Keys

A

Cryptographic representations of Identity that replace username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EAP (Extensible Authentication Protocol)

A

Authentication framework for wireless networks. Integrates with 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PAP (Password Authentication Protocol)

A

Password centric authentication protocol. More modern solutions such as CHAP and EAP have replaced it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CHAP (Challenge Handshake Authentication Protocol)

A

Uses an encrypted challenge and a three-way handshake to send credentials. More secure than protocols like PAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RADIUS

A

AAA system for network devices. Passwords are obfuscated by a shared secret and MD5 hash, meaning password security isn’t strong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TACACS+

A

Cisco proprietary protocol that uses TCP traffic to provide AAA services. Provides full packet encryption as well as granular command controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kerberos

A

Network authentication protocol that allows communication over a non-secure network.

  • Works on the basis of tickets to allow nodes communicating over a non-secure network to provide their identity to one another in a secure manner. Comprised of 3 elements, the primary, the instance, and realms. Can use SSO.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kerberos Tickets

A

When a client wants to access a network service they request an authentication ticket, or ticket granting ticket (TGT). An authentication server checks the clients credentials and responds with the ticket, which is encrypted using the ticket granting service’s (TGS) key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SAML (Security Assertion Markup Language) “Internet systems often rely on a number of core technologies to accomplish Authentication and Authorization”

A

XML based open standard for exchanging authentication and authorization information. Common solution for federated environments because it can accept SAML assertions from a range of identify providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OpenID open identity provider (IdP)

A

Open standard for decentralized authentication, can be leveraged for third party sites. (think Log In with Google). Relying Parties (RPs) direct authentication to the IdP and receive a response back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OAuth

A

Open standard for authorization. OAuth provides a method for users to determine what information to provide to third-party applications and sites without sharing credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSO (Single Sign On)

A

SSO allows user to log in with single identity and use multiple systems/services without re-authenticating. *Additional authentication may be required for privileged accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Federation

A

A federated environment allows different organizational units to work together through a defined contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IdP (Identity Provider)

A

Provides identity and authentication services via an attestation process in which the IdP validates that the user is who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SP (Service Providers)

A

Provide services to users whose identities have been attested to by an IdP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RP (Relying Party)

A

Similar meaning to service party, the RP will require authentication and identity claims from an IdP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

LDAP (Lightweight Directory Access Protocol)

A

Used to manage and communicate with directories.

Protocol for enabling anyone to locate data about organizations, individuals, and other resources such as files and devices in a network. Often broken into OU (organizational units) and CN (Common Names).

20
Q

MFA (multi-factor authentication) 3 factors

A

Something you know- passwords, PINs, answer to security question.
Something you have- smartcard, token, security key.
Something you are- fingerprint, retina scan, even typing speed.

21
Q

MFA attributes

A

Somewhere you are- physical location (location factor)
Something you can do- picture password, (I am not a robot)
Something you can exhibit- behavior pattern
Someone you know- trusted relationships

22
Q

TOTP (Time-based One Time Password)

A

Uses algorithm to derive a one-time password using the current time as part of the code-generation process (Google Authenticator). Codes valid for a set period of time.

23
Q

HOTP (HMAC-based One-Time Password)

A

HMAC Based One Time Password, HMAC stands for Hash-based Message Authentication Code. HOTP uses a seed value that both the token or HOTP app and validation server use, as well as a moving factor. You typically press a button, moving factor is a counter, which is stored on the token and server. The codes are iterative so they can be checked for last known use of the token.

24
Q

SMS One Time Password

A

SMS sent to phone with authentication code. Less secure than both TOTP and HOTP.

25
Q

Push Notification Authentication

A

Sometimes used when hardware, software tokens and SMS aren’t suitable. Not as secure as other methods of authentication.

26
Q

Static Codes

A

At times there is a need for a one time password that doesn’t require connectivity. Static codes are algorithmically pre-generated and printed or stored in a secure location (creating new risk).

27
Q

Biometrics - FRR and FAR

A

False Rejection Rate is when legitimate biometric measures are presented and the system rejects it.
False Acceptance Rate is when illegitimate biometric measures are presented and the system accepts it.

28
Q

Biometrics - ROC and CRR

A

Relative Operating Characteristic compares FRR and FAR, typically a graph. As you decrease FAR, you increase FRR. System should balance both. CRR is the point on the graph where the two lines intersect.

29
Q

Knowledge Based Authentication

A

KBA is frequently used for password resets in the form of security questions. Also used to validate users creating accounts. Generated from things the account requestor should know, such as last years tax return amount, or previous home address street number. NOT likely to be your pet name or first car since these things are easily discoverable.

30
Q

Managing Passwords

A

Password Vaults are software solutions that manage store and secure passwords.

31
Q

TPM (Trusted Platform Module) Standard

A

TPM Modules have crypto-processors that store RSA key pairs protected by a password set by the user.
International Standard.

32
Q

HSM (Hardware Security Module)

A

Physical security device that manages and secures digital keys, performs encryption/decryption for digital signatures and strong authentication. Traditionally in the form of a plug in card, cloud providers now provide HSMs as a service, allowing secure HSMs to cloud infrastructure.

33
Q

Privileged Access Management

A

PA tools can be used to ensure the concept of least privilege, allowing only minimum privileges needed for a role/task.

34
Q

Access Control: ABAC

A

Attribute Based Access Control relies on attributes of the user., allowing rulesets based on attributes that provide the user with specific rights based on the attributes they have. Can be very flexible, but ABAC policies can be complex to manage as a result of that flexibility.

35
Q

Access Control: RBAC

A

Role Based Access Control systems rely on roles that are matched with the privileges that are assigned to those roles. 3 Rules:
Role Assignment - subject can only use permissions matching role they’ve been assigned.
Role Authorization - subjects active role must be authorized for the subject. (prevents subjects from taking on roles not assigned to them.)
Permission Authorization - subjects can use only permissions that their active role is allowed to use.

36
Q

Access Control: RuBAC

A

Rule Based Access Control is applied using set of rules, or access control lists (ACLs) that apply to various objects/resources. When an attempt is made to access an object, the rule is checked to see if the access is allowed.

37
Q

Access Control: MAC

A

Mandatory Access Control systems rely on the operating system to enforce control as set by a security policy administrator. Relatively rare compared to DAC.

38
Q

Access Control: DAC

A

Discretionary Access Control is access control in which the owner delegates rights and permissions to those objects they desire. This is how most people run home PCs. Linux Default setup.

39
Q

Security+ Specific Access Controls

A

Privileged Access Management is the set of controls, tools, and processes used to handle privileges for elevated accounts and rights.
Conditional Access describes the process of testing security state of devices and users before allowing access to data, networks and other resources.

40
Q

Filesystem Controls

A

Filesystem controls determine which accounts, users, groups, or services can perform actions like reading, writing, and executing files.

41
Q

What is DHCP?

A

Dynamic Host Configuration Protocol is a network management protocol used to assign local IP addresses to devices on a network.

42
Q

What is TLS

A

Transport Layer Security is an encryption protocol that replaced SSL.

43
Q

What is TCP and UDP

A

Transmission Control Protocol is a connection oriented protocol whereas UDP is a connectionless protocol. Key difference is speed, UDP is much faster.

44
Q

When is it appropriate to use either TCP or UDP?

A

TCP should be used when security is more important than speed, such as in file transfers. TCP can retransmit lost packets of data.
UDP should be used when speed is more important than security, such as live streaming or video gaming.

45
Q

What is AAA refer to?

A

Authentication, Authorization, and Accounting.