Domain 5: Identity and Access Management 13% Flashcards
Access Control
who do we give access and what do we give them access to. Spans all layers of our def DID model
IAAA (ID, Authn, Auth, Acct)
Access Management
Identification
your username, ID #, Employee #, SSN
Authentication
Should always be with MFA (multi-fac authen)
Type 1 Authentication
Something you know- pwd, pass phrase, PIN etc, also called Knowledge factors.
Type 2 Authentication
Something you have- ID, Passport, Smart Card, Token, cookie on PC
Type 3 Authentication
Something you are- Biometrics: fingerprint, Iris scan, facial geometry etc
Type 4 Authentication
Somewhere you are- IP/MAC address
Type 5 Authentication
Something you do- signature, pattern unlock
MFA (multi-fac authen)
requires authn from 2 or more categories (Types)
Type 1 Brute Force attacks
Uses the entire key space (every possible key), with enough time any plaintext can be decrypted.
Type 1 Dictionary attacks
based on a pre-arranged listing, often dictionary words.
Type 1 Rainbow tables attacks
Pre-made list of plaintext and matching ciphertext.
Type 1 Salt (salting)
random data that is used as an additional input to a one-way function that hashes a password or passphrase.
Type 1 Nonce
arbitary # that may only be used once.
Type 1 Clipping levels
are in place to prevent administrative overhead.
Type 2 Single-use pwd
Something you have.
Type 2 Smart Cards
They contain a compu circuit using an integrated circuit chip. Some are contact cards others are contactless cards.
Type 2 Token HOTP
(HMAC-based 1-time pwd) shared secret and incremental counter, generate code when asked, valid till used.
Type 2 TOTP
(Time-based 1-time pwd) Time based shared secret, often gener every 30/60sec
Type 3
False accept means allowing unauth people to access a resource. Falso reject means denying a ligitamit user access to a resource.
Type 3 FRR (False rejection rate) Type 1 error
authorized users are rejected
Type 3 FAR (False accept rate) Type 2 error
Unauthorized user is granted access.