GCGA Ch.2 Understanding Identity and Access Management Flashcards

(24 cards)

1
Q

Authentication

A

proves an identity with some type of credentials, such as a username and password. Identification occurs when someone makes a claim about their identity w/ unique identifiers (username/email). Users prove it with a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorization

A

provides access to resources based on proven identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accounting

A

tracks user activity, records it in logs. Allows security admins to create an audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Audit trail

A

allows security professionals to re-create the events that preceded a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication methods

A

something you know (password, PIN), something you have (smart card, phone, USB token), something you are (biometrics), somewhere you are (home, office) - are, place, have, know (APHK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

KBA

A

Knowledge-Based Authentication - method of authenticating individuals based on what they know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Static KBA

A

you answer questions about yourself, such as dog’s name or mother’s maiden name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dynamic KBA

A

queries public/private data sources like credit reports, vehicle registrations, property records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HOTP & TOTP

A

HMAC-based one-time password & time-based one-time password - open-source standards used to generate one-time-use passwords; HOTP passwords do not expire until used; TOTP generates one-time passwords that expire after a specified period of time (typically 30-60s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FAR

A

False acceptance rate - identifies % of times false acceptance occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FRR

A

False rejection rate - identifies % of times false rejections occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CER

A

Crossover error rate - indicates biometric system’s quality. Lower CER is better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Best practices for accounts

A

don’t share accounts/passwords, most orgs make sure Guest acct disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PAM

A

Privileged access management - implements stringent security controls over accounts with elevated privileges, such as administrator or root accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Account disablement policy

A

ensures that inactive accounts are disabled (for employees who resign/are terminated).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Account audit

A

looks at rights & permissions assigned to users; enforces least privilege principle

17
Q

SAML

A

Security Assertion Markup Language - XML-based standard used to exchange authentication/authorization info between parties

18
Q

OAuth

A

open standard for authorization; allows users to log on with another account, i.e. Google, Facebook, PayPal, Microsoft, etc.; uses API calls to exchange info and a token to show access is authorized.

19
Q

Role-BAC

A

role-based access control - uses roles to grant access by placing users into roles based on their assigned jobs, functions, or tasks.

20
Q

Group-based privileges

A

a form of role-BAC. Administrators create groups, add users to the groups, and then assign permissions to the groups.

21
Q

Rule-BAC

A

rule-based access control - based on a set of approved instructions, such as ACL rules in a firewall. Some rule-BAC implementations use rules that trigger in response to an event, such as modifying ACLs after detecting an attack.

22
Q

DAC

A

Discretionary access control - every object has an owner. The owner has explicit access and establishes access for any other user. Microsoft NTFS uses the DAC scheme, with every object having a discretionary access control list (DACL). The DACL identifies who has access and what access they are granted.

23
Q

MAC

A

Mandatory access control - uses security or sensitivity labels to identify objects (what you’ll secure) and subjects (users). It is often used when access needs to be restricted based on a need to know. The administrator establishes access based on predefined security labels. These labels are often defined with a lattice to specify the upper and lower security boundaries.

24
Q

ABAC

A

Attribute-based access control - evaluates attributes and grants access based on these attributes’ values. It is used in many software-defined networks (SDNs).