Domain 5: Identity and Access Management (Controlling Access and Managing Identity) Flashcards
Password cracking
refers to an offline technique in which the attacker has gained access to the password hashes or database
Clipping levels
Clipping levels can help to differentiate the attacks from noise, however they can also cause false negatives if the attackers can glean the threshold beneath which they must operate.
A hybrid attack
prepends, or changes characters in words from a dictionary before hashing, to attempt the fastest crack of complex passwords
Synchronous dynamic tokens
use time or counters to synchronize a displayed token code with the code expected by the authentication server: the codes are synchronized.
False Reject Rate (FRR)
A false rejection occurs when an authorized subject is rejected by the biometric system as unauthorized. False rejections are also called a Type I error
False Accept Rate (FAR)
A false acceptance occurs when an unauthorized subject is accepted as valid.Type II error
SAML
SAML is an XML-based framework for exchanging security information, including authentication data.
he primary weakness of Kerberos is that..
the KDC stores the keys of all principals
The KDC and TGS are also
single points of failure:
SESAME stands for Secure European System for Applications in a Multi-vendor Environment, a single sign-on system that supports heterogeneous environments
It addresses one of the biggest weaknesses in Kerberos: the plaintext storage of symmetric keys.
The Password Authentication Protocol (PAP)
and is referred to as being, “not a strong authentication method.
The advantage of using CHAP over PAP
he additional security provided by the shared secret used during the challenge and response: a sniffer that views the entire challenge/response process will not be able to determine the shared secret.
Discretionary Access Control (DAC)
gives subjects full control of objects they have created or been given access to, including sharing the objects with other subjects
Mandatory Access Control (MAC)
is system-enforced access control based on a subject’s clearance and an object’s labels. Subjects and Objects have clearances and labels, respectively, such as confidential, secret, and top secret.
Role-Based Access Control (RBAC)
defines how information is accessed on a system based on the role of the subject