Domain 5 - Identity and Access Management Flashcards
Information that is created, consumed or modified by an organization. Could be labeled as a ______?
Asset
All about the relationship between users and data.
Access Control
What control type is defined by the following:
a. Fences
b. locks
c. bio metrics
d. mantraps
e. lighting
f. separation of duties
g. job rotation
h. data classification
i. CCTV
Preventative
What control type is defined by the following:
a. security guards
b. motion sensors
c. audit trails
d. review of CCTV footage
e. honeypots | honeynets
f. IDS
g. incident response
Detective
What control type is defined by the following:
a. rebooting a system
b. terminating a system
c. A/V software quarantine
d. data restoration
e. IPS
Corrective
What control type is defined by the following:
a. policies
b. awareness training
c. locks
d. fences
e. warning signs
f. guards
g. mantraps
h. CCTV
Deterrent
What control type is defined by the following:
a. fault tolerant systems
b. system clusters
c. imaging
d. mirroring
Recovery
What control type is defined by the following:
a. procedures
b. exit signage
c. announced commands
Directive
What control type is defined by the following:
a. When guard is not present to sign in, use badge to swipe
b. when badge swipe does not work, use intercom and CCTV system to request access.
Compensating
Provides AAA services between network access servers and an authentication server. The network access server is the client of the ______ server.
RADIUS (PROTOCOL for AAA)
RADIUS only encrypts the password exchange, not the rest of the authentication traffic. Uses UDP.
Open source solution for TACACS and XTACACS. Separates AAA processes, allowing them to be hosted separately if necessary.
TACACS+ (PROTOCOL for AAA)
Encrypts ALL authentication information and uses TCP 49
Uses TCP port 3368 or Stream Control Protocol (SCTP) port 3668. Supports IPSEC and TLS
Diameter
What process defines the following:
a. Identification
b. Authentication
c. Authorization
d. Access / Auditing
IAAA
Access Control Life cycle
“subject claiming an identity”
Identification
“Verifies / validates identity of subject through comparison of factors provided (provides validity) “
Authentication
“Subject is granted access to object based on validated identity”
Authorization
“Subject interacts with object”
Access
Tracked through auditing
Something you have …
Smartcard or Token
Something you know …
Pin or password
Something you are …
Biometric
3 categories of control are ______
Administrative, Technical and Physical
2 types of bio-metrics are ?
Physiological (Fingerprints …etc)
and
Behavioral (Signature and Keystrikes)
All users authenticate back to a central authentication server from remote offices.
Centralized Access Control
Authenticate once to centralized access control
Single sign On