Domain 5: Identity and Access Management Flashcards
What is a credential set?
A credential set is the term used for the combination of both the identification and authentication of a user
What are static passwords?
Static passwords are reusable passwords that may or may not expire. They are typically user-generated and work best when combined with another authentication type, such as a smart card or biometric control
What are passphrases?
Passphrases are long static passwords, comprised of words in a phrase or sentence
What are one time passwords?
One-time passwords may be used for a single authentication. They are very secure but difficult to manage. A one-time password is impossible to reuse and is valid for just a one-time use.
What are dynamic passwords?
Dynamic passwords change at regular intervals. RSA security makes a synchronous token device called SecurID that generates a new token code every 60 seconds. The user combines their static PIN with the RSA dynamic token code to create one dynamic password that changes every time it is used
What is a rainbow table?
A rainbow table acts as a database that contains the precomputed hashed output for most or all possible passwords.
What is the purpose of a salt?
A salt allows one password to hash multiple ways. Some systems (like modern UNIX/Linux systems) combine a salt with a password before hashing
What is the purpose of a salt value?
A salt value ensures that the same password will encrypt differently when used by different users. This method offers the advantage that an attacker must
encrypt the same word multiple times (once for each salt or user) in order to mount a successful password-guessing attack.”1 As a result, rainbow tables are far less effective, if not completely ineffective, for systems using salts
What are synchronous dynamic tokens?
Synchronous dynamic tokens use time or counters to synchronize a displayed token code with the code expected by the authentication server (AS).
What are asynchronous dynamic tokens?
Asynchronous dynamic tokens are not synchronized with a central server. The most common variety is challenge-response tokens
What are the three metrics used to judge biometric accuracy?
Three metrics are used to judge biometric accuracy: the false reject rate (FRR), the false accept rate (FAR), and the crossover error rate (CER)
When does a false rejection occur?
A false rejection occurs when an authorized subject is rejected by the biometric system as unauthorized. False rejections are also called a Type I error
When does a false acceptance occur?
A false acceptance occurs when an unauthorized subject is accepted as validThis type of error is also called a Type II error
What does the CER describe?
The CER describes the point where the FRR and FAR are equal. CER is also known as the equal error rate (EER). The CER describes the overall accuracy of a biometric system
What is a retina scan?
A retina scan is a laser scan of the capillaries that feed the retina of the back of the eye. This can seem personally intrusive because the light beam must directly enter the pupil, and the user usually needs to press their eye up to a laser scanner eyecup.
What is an iris scan?
An iris scan is a passive biometric control. A camera takes a picture of the iris, the colored portion of the eye, and then compares photos within the authentication database
What are keyboard dynamics?
Keyboard dynamics refer to how hard a person presses each key and the rhythm in which the keys are pressed. Surprisingly, this type of access control is cheap to implement and can be effective
What do dynamic signatures measure?
Dynamic signatures measure the process by which someone signs his/her name. This process is similar to keyboard dynamics, except that this method measures the handwriting of the subjects while they sign their name
What is the purpose of centralized access control?
Centralized access control concentrates access control in one logical point for a system or organization. Instead of using local access control databases, systems authenticate via third-party ASs. Centralized access control can be used to provide single sign-on (SSO), where a subject may authenticate once, then access multiple systems.
What does centralized access control provide?
Centralized access control centrally provides the three As of access control: authentication, authorization, and accountability.
• Authentication: proving an identity claim.
• Authorization: actions-authenticated subjects are allowed to perform on a system.
• Accountability: the ability to audit a system and demonstrate the actions of subjects.
What is the purpose of decentralized access control
Decentralized access control allows IT administration to occur closer to the mission and operations of the organization. In decentralized access control, an organization spans multiple locations, and the local sites support and maintain independent systems, access control databases, and data. Decentralized access control is also called distributed access control.
What does SSO allow for?
Single sign-on (SSO) allows multiple systems to use a central AS. This allows users to authenticate once and have access to multiple different systems. It also allows security administrators to add, change, or revoke user privileges on one central system.
When does access aggregation occur? When does this happen?
Access aggregation occurs as individual users gain more access to more systems. This can happen intentionally, as a function of SSO. It can also happen unintentionally, because users often gain new entitlements, also called access rights, as they take on new roles or duties. This can result in authorization creep, in which users gain more entitlements without shedding the old ones.
What does FIdM do?
Federated identity management (FIdM) applies SSO at a much wider scale: ranging from cross-organization to Internet scale. It is sometimes simply called identity management (IdM).
What does FIdM use to exchange security information?
FIdM may use OpenID or SAML (security association markup language). SAML is an XML-based framework for exchanging security information, including authentication data
What are the 8 components of Kerberos?
Kerberos has the following components:
• Principal: Client (user) or service.
• Realm: A logical Kerberos network.
• Ticket: Data that authenticates a principal’s identity.
• Credentials: A ticket and a service key.
• KDC: Key Distribution Center, which authenticates principals. (consists of TGS and AS)
• TGS: Ticket Granting Service.
• AS: Authentication server
• C/S: Client Server, regarding communications between the two