CISSP ch 13 Flashcards

1
Q

IAM

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identification

A

the process of a subject claiming or professing an identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

verifying a subject’s identity by comparing one or more factors against a database of valid identities, such as user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

KBA

A

Knowledge based authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cognitive password

A

security questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

authorization

A

indicates who is trusted to perform specific operations = subjects are granted access to objects based on proven identities, for example, administrators grant users access to files based on the user’s proven identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

accountability

A

users and other subjects can be held accountable for their actions when auditing is implemented; auditing tracks subjects and records when they access objects, creating an audit trail in one or more audit logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Synchronous Dynamic Password Tokens

A

time based and synchronized with an authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asynchronous Dynamic Password Tokens

A

does not use a clock, instead, PIN is generated based on an algorithm and an incrementing counter – typically, authentication server will send user a nonce which the user will enter into their hardware token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FRR / Type I error

A

False rejection rate = Type I error = false negative

When an authentication system does not authenticate a valid user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FAR / Type II error

A

False acceptance rate = Type II error = false positive

When an authentication system authenticates someone incorrectly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CER / ERR

A

Crossover error rate = Equal error rate (ERR)

Point in authentication sensitivity where the FRR and FAR percentages are equal

Devices with lower CERs are more accurate than devices with higher CERs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reference profile / reference template

A

store sample of a biometric factor upon registration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Throughput rate

A

amount of time the system requires to scan a subject and approve or deny access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HOTP (two step authentication standards)

A

HMAC-based One-Time Password

HMAC = hash message authentication code

Hash function used to create values of six to eight number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TOTP (two step authentication standards)

A

Time-based One-Time Password

Uses a timestamp and remains valid for a certain time frame

17
Q

IdM

A

Identity management

18
Q

Centralized Access control (identity management)

A

a single entity within a system performs all authorization verification

19
Q

Decentralized/distributed Access control (identity management)

A

various entities located throughout a system perform authorization verification

20
Q

SSO

A

Single sign-on

A centralized access control technique that allows a subject to be authenticated once on a system and access multiple resources without authenticating again

SSO is a benefit of identity management, not a type of identity management

21
Q

Directory service

A

a centralized database that includes information about subjects and objects, including authentication data

22
Q

LDAP

A

Lightweight Directory Access Protocol = used by many directory services

23
Q

AD DS

A

Microsoft Active Directory Domain Services = LDAP based directory service

24
Q

Security domain

A

a collection of subjects and objects that share a common security policy, and individual domains can operate separately from other domains

25
Q

Trusts

A

established between the domains to create a security bridge and allow users from one domain to access another domain’s resources; can be one way or two way

26
Q

FIM

A

Federated identity management = a form of SSO that extends beyond a single organization

27
Q

JIT provisioning

A

just-in-time provisioning = solutions that automatically create the relationship between two entities so that new users can access resources without any administrator intervention

28
Q

IDaaS

A

Identity as a service

29
Q

scripted Access / logon scripts

A

establish communication links by providing an automated process to transmit login credentials at the start of a login session

30
Q

OWASP

A

Open Web Application Security Project = publishes many different cheat sheets that provide application developers specific recommendations