Domain 5 - Identity and Access Management Flashcards
Crossover Error rate
point where false reject rate and false accept rate equal
Represents the overall accuracy of system.
False accept rate
occurs when unauth subject is accepted by a biometric system as valid. AKA Type 2 error
False reject rate
when an authorized subject is falseley rejected. Type 1 error
Type 1 authentication
something you know
password
type 2 auth
something you have (key, keycard)
Type 3
something you are (biometric)
Credential set
term used for combination of identification and authentication.
Passphrase
long password in the form of a sentance. Usually less random.
One time passwords
used for single auth. Very secure but difficult to manage.
NIST 800-63B guideline
guidelines for password complexity
Dynamic Passwords
change at regular intervals. RSA Security makes a synchronous token every 60 seconds.
Expensive
Strong authentication
AKA Multifactor authentication
Password hashes and pass cracking
password is run through a hash and the hash is stored in DB
Linux password hashes
stored in etc/shadow. Only readable by root
Windows password hash
stored locally and on domain controller in SAM File/security management file.
Dictionary attack
run large list of words through hash algs to try and find collision.
Brute force attack
Go through the entire key space. All combos
Hybrid attack
appends, prepends, or changes characters in words from a dictionary before hashing. Attempts fastest crack of complex passwords.
Rainbow table
large dictionary of HASHED passwords. Trandes off lower CPU resources required, for more storage required.
Salts
random value added to pre-hash value. Ensures the same password doesn’t have the same hash twice.
Password MGMT: Pasword history
remember the last 24 passwords
Password MGMT: Max password age
90
Password MGMT: Min password age
2 days
Password MGMT: Min password length
8 char
Password MGMT: Storage
use non-reversible encryption. i.e. hashing
Password MGMT: Storage
use non-reversible encryption. i.e. hashing
Synchronous Dynamic Token
Time or Counters are synced with an auth server.
Google authenticator, RSA Secureid
Asynchronous Dynamic Token
Not synced with a central server. Most common variet are challenge response tokens (CHAP)
Biometrics - accuracy
high accuracy needed
Biometrics - data storage
should be less than 1000 bytes
Enrollment
How long it takes to get biormetrics initially entered into a system for a user
Throughput
How long it takes to be authenticated w/biometric system
Throughput
How long it takes to be authenticated w/biometric system
Retina scan
scans back of eye
iris scan
picture of front of eye.
Hand geometry scan
measures specific points of hand. Can store data in as little as 9 bytes.
Keyboard dynamics
measures how you type. Not super accurate.
Dynamic signature
measures how someone signs their name.
voice print
vulnerable to replay attacks. Measures subjects tone of voice while stating a specific phrase.