Domain 5 -- Identity and Access Management Flashcards
What is a subject?
- A subject is an active entity that requests access to an object or the data within an object
- Can be user, program or process that accesses an object to accomplish a task
What is an object?
- An object is a passive entity that contains information or needed functionality
- Can be a computer, database, file, computer program, directory or field contained in a table in a tableBASE
What is Identification?
Identification describes a method by which a subject (user, program or process) claims to have a specific identity (user name, account number or email address)
What is authentication?
Authentication is the process by which a system verifies the identity of the subject, usually by requireing a piece of information that only the claimed identity should havew
A user identification and authentication information together combine to create ________________.
credentials
What is meant by a race condition with respect to Identity and Access Management?
If authentication and authorization are split into 2 functions, it’s possible that the authorization will occur before the user is authenticated.
What are three somethings for authentication?
- Type 1 Something a person knows
- Type 2 Something a person has
- Type 3 Something a person is
Creating or issuing secure identitites should include which 3 aspects?
- Uniqueness
- must uniquely identify a person
- Non-descriptive
- Don’t use ID’s like Administrator or backup_operator
- Issuance
- Provided by another authority
- Example is an ID card
- Provided by another authority
it is important to authenticate not only users, but also __________.
systems
What are 4 Identification Component Requirements?
- Each value should be unique
- A standard naming scheme should be followed
- The value should be nondescriptive of the user’s position or tasks
- The value should not be shared between users
What are the 3 things that MAC can stand for in the CISSP exam?
- Media Access Control (MAC Address)
- Mandatory Access Control
- Message Authentication Code
What are the rules for a database directory based on the X.500 standard?
- The directory has a tree structure to organize entries using parent-child configuration
- Each entry has a unique name made up of attributes of a specific object
- The attributes used in the directory are dictated by the defined schema
- The unique identifiers are called distinguished names
Are cookies always stored on disk?
No.
Some cookies are permanent and remain on the user’s hard disk
Other cookies – such as cookies issued by a bank to allow a user to perform online banking should only be held in memory
Web Access Management Products are typically used for ___________ users and Credential Management products are typically used for __________ users
external
internal
What’s the difference between password synchronization and SSO
- With password synchronization, the tool takes the user’s password and then updates all the applications he uses with this password. The user must still log in separately to each application
- SSO means that the SSO software intercepts the user ID/password dialog and fills it in for the user. The user only needs to log in once.
What are the downsides of SSO?
- It’s expensive
- It can take a long time to implement
- All user credentials are stored in one place. If an attacker broke in, then they would have everything.
What are the two categories of biomentrics?
- Physiological - what you are
- fingerprints
- retina scans
- Behavioral - what you do
- signature dynamics
What is the Crossover Error Rate (CER) as it relates to biometric authentication systems
It’s the point at which the percentage of false positives and false negatives are equal.
What are some of the biometrics that can be used to identify a user?
- Fingerprint
- Palm scan
- Hand geometry
- Retina scan
- Iris scan
- Signature dynamics
- Keystroke dynamics
- voice print
- facial scan
- Hand topogragy
What are six ways an attacker can try to steal passwords?
- electronic monitoring
- access password file
- brute force attacks
- dictionary attacks
- social engineering
- rainbow table
What are some of the common methods of authentication via “something you know?”
- PIN
- Password
- Passphrase
- Cognitive password (favorite color)
- personal history info
- CAPTCHA
What’s the key difference between synchronous and asynchronous token devices?
Synchronous tokens depend on using time or a counter as a core piece of the authentication process
Asynchronous tokens depend on a nonce – a random value sent by the authentication server. User enters the nonce into the token device, which encrypts it and gives the user a OTP, which the users sends to the auth server along with userid/pw.
If the auth server can decrypt the value and it matches what was sent earlier, the user is authenticated.
What are some of the cryptographic methods that are used in authenticating a user?
- Digital Signature (private key that is used to encrypt a hash value)
- Passphrase -StickWithMeKidAndYouWillWearDiamonds
- application converst passphrase into a virtual passphrase that might be 128 bytes long.
- The virtual password is what is actually used for authentication on the wire
What’s the difference between a memory card and a smart card?
- A memory card can only hold information, but not process information
- A smart card can both hold and process information
If an attacker steals someone’s smart card, can they do a lot of damage with it?
Not really because the attacker would need the user’s pin before the smart card would work.
What are the two types of smart cards?
- contact – which require physical contact with the reader to work
- contactless – which use an antenna on the chip to receive power from the reader to work.
What’s the difference between a fault generation attack and a side channel attack on a smart card?
fault generation is where you attempt to introduce an error in the smart card by using higher voltages or some other means to intentionally introduce an error and find clues to reverse engineer the device
Side channel attacks observe how they work under various circumstances to find clues to use in reverse engineering. (eg. differential power analysis).
What is authorization creep?
Over time employees move from one dept to another and they get more and more access rights than they really need any more.
What are the main components of Kerberos?
- Key Distribution Center (KDC)
- holds all users and services secret keys
- provides authentication and key distribution service
- Principals are users and services
- Kerberos authentication process
What is the difference between a secret key and a session key in Kerberos
- Secret key is shared between the Key Distribution Center (KDC) and the principal and is static in nature
- A session key is shared between two principals and is generated when needed and destroyed with the session has completed
Kerberos is an example of a ____________ technology.
Single Sign On (SSO)
What are the weaknesses of Kerberos?
- The Key Distribution Center (KDC) can be a SPOF (redundancy needed)
- KDC must be scalable
- Secret Keys are stored on user workstations, which means that it’s possible for users to obtain the cryptographic keys
- Session keys are decrypted and reside on user workstations (either in cache or a session key table. They can be captured by attackers
- KDC is susceptible to password guessing. The KDC does not know if a dictionary attack is taking place
- Network traffic is not protected by Kerberos if encryption is not enabled
- If keys are too short, they are vulnerable to brute force attacks
- Kerberos requires client and server clocks to be synchronized
- What is a counter measure to Kerberos lack of functionality against dictionary attacks?
The operating system can limit the number of password attempts a user can make.
What are 4 single sign-on technologies?
- Kerberos
- Security Domains
- Directory Services
- Thin Clients
What are system-level events that can be audited and logged?
- System performance
- Logon attempts (successful and unsuccessful)
- Logon ID
- Date and time of each logon attempt
- Lockouts of users and terminals
- Use of admin utilities
- Devices used
- Functions performed
- Requests to alter config files
What are Application-level events that can be audited and logged?
- Error messages
- Files opened and closed
- Modification of files
- Security violations within applications
What are user-level events that can be audited and logged?
- Identification and authentication attempts
- Files, services, and resources used
- commands initiated
- Security violations
What is a Security Information and Event Management (SIEM) system?
- Products that gather logs from various devices
- servers
- firewalls
- routers
- etc.
- They attempt to analyze and correlate data
What are three common triggers for session termination?
- Timeout
- Inactivity
- Anomoly
What is a federated identity?
A federated identity is a portable identity that can be used across business boundaries