EXAM 3 FLASH Flashcards

1
Q

Trusted Platform Model (TPM)

A

hardware solution on motherboard that assists with key generation and storage & random number generation. Keys are stored on a separate part of motherboard to ensure physical security protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hardware Security Model (HSM)

A

device used to manage and/or store encryption keys. Can help with cryptographic features like encrypting, hashing, and using digital signatures.
Are usually connected using USB that provide tamper protection mechanisms from other users looking to find the usb via network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Knowledge Based Authentication

A

method where the user is identified using using common set knowledge.
EX: When verifying bank info, the website has you to verify your address out of a lineup of similar addresses, knowledge that was set in place for you to verify later at the time of setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Extensible Authentication Protocol (EAP)

A

designed to support multiple authentication mechanisms using PPP (Point to Point Protocol). Connecting authentication certificates, tokens, one time passwords, smart cards, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Challenge-Handshake Authentication Protocol (CHAP)

A

Provides Authentication through the usage of challenge and response protocol systems (called a 3 way handshake)
The client sends a message to the server, the server must send the correct message back for the authentication to be granted or denied (the last part of the handshake)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password Authentication Protocol (PAP)

A

Involves a two way handshake in where the password and username are sent across the link in clear text. Does not provide any protection from line sniffing and playback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

802.1X

A

Authentication standard that supports port related authentication services between a user and an authorization device like an edge router. Commonly used on wireless access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Remote Authentication Dial-In User Service (RADIUS)

A

(AAA Protocol and UDP transport) Provides client systems with authentication and access control within an enterprise network.
IS USUALLY A NETWORK ACCESS SERVER (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Assertion Markup Language (SAML)

A

A single sign on capability used for web applications to ensure user identities can be shared and are protected.

Defines standard for exchanging authorization and authentication data between security domains.

XML based protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Terminal Access Controller Access Control System Plus (TACACS+)

A

Protocol that takes a client/server model approach and handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS in the AAA protocol system but this uses TCP transport method. (RADIUS uses UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Open Authorization (OAUTH)

A

is an open protocol that allows secure token based authorization from the web, mobile, and desktop applications using a simple and standard method. Designed to remove the need for users to share their passwords with third party applications. Instead, using a substituting token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OpenID

A

a simple identity layer on top of the OpenAuthorization protocol. Created to allow third party applications to authenticate your users for you by using the accounts that users already own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kerberos

A

Third party authentication service that uses a series of tickets as tokens for authenticating users. The steps are protected using strong cryptography.
Communicates via. tickets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access Control Schemes

A

Refers to all security features used to prevent unauthorized access to a computer system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attribute Based Access Control (ABAC)

A

Evaluates specific rules and policies against attributes associated with a subject or object.
Major difference between ABAC and and Role Based Access Control (RBAC) is the ability to use boolean logic in access control decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Role Based Access Control (RBAC)

A

each user is assigned a set of roles that he or she may perform. The roles that they are assigned to do are then turned into granted access permissions

17
Q

Rule Based Access Control (also is RBAC)

A

a series of rules will be contained in the ACL and will be used to determine whether access should be granted or not.

18
Q

Mandatory Access Control (MAC)

A

A means of restricting access to objects based on the sensitivity of information contained in the objects and the formal authorization of subjects to access information of such sensitivity.
(MULTILEVEL SECURITY)

19
Q

Discretionary Access Control (DAC)

A

A means of restricting access to objects based on the identity of subjects and or groups to who they belong to. The controls are discretionary.
(USES ACLs)

20
Q

Conditional Access

A

access control scheme in where specific conditions are examined before access is given. “is _____ then ______”
The list of conditions can be broad or narrow

21
Q

Privileged Accounts

A

accounts with greater than normal user access.
Root/Domain access.
Think, Administrative authority
Requires real time monitoring
may need to perform tasks via. remote session

22
Q

Public Key Infrastructure (PKI)

A

made up of hardware, applications, algorithms, users, and utilities that work together in order to allow secure and predictable communication

23
Q

4 Main types of Certificates

A
  • End Entity Certificates
  • CA Certificates
  • Cross-Certification Certificates
  • Policy Certificates
24
Q

End Entity Certificates

A

Issued by a CA to a specific subject

25
Q

CA Certificate

A

can be self assigned or assigned by a superior CA with a higher clearance within the hierarchical model

26
Q

Cross Certificates

A

Are used when independent CAs establish peer to peer trust relationships

27
Q

Policy Certificates

A

For higher security applications, a mechanism is required to provide centrally controlled policy information to PKI clients - this is done with a policy certificate

28
Q

KEY ( A certificate format)

A

a key file. “ .key”
Can be used for both public and private PKCS#8 keys
Must be encoded as binary (DER) or ASCII PEM

29
Q

Distinguished Encoding Rules (DER)

A

encoding rules that can be used to encode any data object into a binary file
Can be used for a single certificate

30
Q

Privacy Enhanced-Electronic Mail (PEM)

A

The most common format used by certificate authorities.
Encoded in ASCII that begins with —–“Begin Certificate”——, followed by Base 64 data and then closing with ——-“End Certificate”——-
Supports multiple digital certificates
PEM format is used any many different file types. “ .key, .pem, .cer” etc.

31
Q

PFX

A

PKCS#12 portable file format with .pfx extension
Binary format for storing server certificate
PFX files are usually used on Windows operating systems

32
Q

P 12

A

An alternative file extension for PKCS#12 file format

33
Q

P7B

A

PKCS #7 OR P7B format stored in base 64 ASCII format
File extension either .p7b or .p7c
Begins with ——“Begin PKCS7”——- and only contains certificates and chain certificates
Most common platforms are Windows and Java Torncat

34
Q

CER

A

.cer file extension to denote an alternative form from Microsoft, of CRT files
.cer or .crt files may be recorded as binary (DER) or ASCII PEM
these file extensions are synonymous
.cer for Microsoft and .crt for Unix based systems

35
Q

Online vs. Offline CA

A

if a