CISSP Domain 5 Flashcards
Synchronous dynamic password tokens
Time based synchronised with authentication server
Generate pin periodically
Asynchronous dynamic password tokens
Generates pin based on an algorithm+Incrementing counter
Face scan
Geometric pattern of faces
Fingerprint
Visible pattern in hands
Retina scans and accuracy level ?
Focus onpattern of blood vessels at back of eye
Iris scans and accuracy level .?
Coloured area around the pupil ( second most accurate after retina)
2 types of OTP
HOTP : Uses hmac to create OTP of 6 digits
Valid until used
TOTP: Timestamp and remains valid for certain time
What is Service account and how to manage password
Non user account
Password to be changed manually
Configure it to be non interactive for user
Directory services
Centralised database that includes into of Subject and object including authentication data
Based on LDAP services
Security domain and how can trust be established?
collection of subjects and objects that share a common security policy
Trusts are established can be one way or two way
Federated identity management and can you give examples of cloud based FIM
Sso is common in internal network but can be implemented in external using FIM
Cloud based - udemy, LinkedIn
Works on trust relationship between: User, IdP and service provider
Type of FIM
On premise
Cloud
Hybrid
Just in time
Just in time
Food app in CG offer not only food but other benefits
Exchange of data happens from CG to food using SAML
Ephemeral or broker and remove access
Excessive Prevlige Vs prevlige creep
More than what is required
Accumulation of prevlige
What are Identity management implementation techniques
Centralised access control - Single entity performs all Authorization verification - GAS
Decentralised access control- Various entities located throughout perform Authorization verification
Kerberos steps
- Client requests access to Kerberos environment
- Client sends username to TGT ( Authentication service) - Domain controller
- AS encrypts TGT with clients password
- Only the client can decrypt TGT using password
- Enters Realm with TGT
- Client sends request to TGS to access printer
- Verifies TGT and grants a Ticket
- Cool thing about this ticket:
-2 copies of the exact same session key
Key 1: Encrypted with clients password
Key 2:Print server password
- Only the print server can decrypt the session key using its password
- This proves the client has been authenticated and can establish a session to fulfill the desired requirement of client -Mutual authentication
Secured network design - Bastion host, screened host and subnet
Bastion host: Exposed to the internet but Hardened
Screened host: Firewall protected system logically positioned inside network
Screened subnet : 3 way
Vertical prevlige escalation
Greater privilege than what is required like admin privilege