CISSP ch 13 Flashcards
IAM
Identity and Access Management
Identification
the process of a subject claiming or professing an identity
Authentication
verifying a subject’s identity by comparing one or more factors against a database of valid identities, such as user accounts
KBA
Knowledge based authentication
Cognitive password
security questions
authorization
indicates who is trusted to perform specific operations = subjects are granted access to objects based on proven identities, for example, administrators grant users access to files based on the user’s proven identity
accountability
users and other subjects can be held accountable for their actions when auditing is implemented; auditing tracks subjects and records when they access objects, creating an audit trail in one or more audit logs
Synchronous Dynamic Password Tokens
time based and synchronized with an authentication server
Asynchronous Dynamic Password Tokens
does not use a clock, instead, PIN is generated based on an algorithm and an incrementing counter – typically, authentication server will send user a nonce which the user will enter into their hardware token
FRR / Type I error
False rejection rate = Type I error = false negative
When an authentication system does not authenticate a valid user
FAR / Type II error
False acceptance rate = Type II error = false positive
When an authentication system authenticates someone incorrectly
CER / ERR
Crossover error rate = Equal error rate (ERR)
Point in authentication sensitivity where the FRR and FAR percentages are equal
Devices with lower CERs are more accurate than devices with higher CERs
Reference profile / reference template
store sample of a biometric factor upon registration
Throughput rate
amount of time the system requires to scan a subject and approve or deny access
HOTP (two step authentication standards)
HMAC-based One-Time Password
HMAC = hash message authentication code
Hash function used to create values of six to eight number