Given a scenario, implement authentication and authorization solutions Flashcards

1
Q

Authentication management

A
Password keys
Password vaults
TPM
HSM
Knowledge-based authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password keys

A

Password key—USB tokens for connecting to PCs and smartphones. Some can use nearfield communications (NFC) or Bluetooth as well as physical connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Password vaults

A

Password vault—software-based password manager, typically using a cloud service to allow access from any device (pcmag.com/picks/the-best-password-managers). A USB key is also likely to use a vault for backup. Most operating systems and browsers implement native password vaults. Examples include Windows Credential Manager and Apple’s iCloud Keychain (imore.com/icloud-keychain).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TPM

A

Trusted Platform Module (TPM)—a secure cryptoprocessor enclave implemented on a PC, laptop, smartphone, or network appliance. The TPM is usually a module within the CPU. Modification of TPM data is only permitted by highly trusted processes. A TPM can be used to present a virtual smart card (docs.microsoft.com/en-us/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HSM

A

An appliance for generating and storing cryptographic keys. This sort of solution may be less susceptible to tampering and insider threats than software-based storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Knowledge-based authentication

A

Knowledge-based authentication refers primarily to issuing users with password-based account access mechanisms. Configuring password-based authentication protocols and supporting users with authentication issues is an important part of the information security role. In this topic, you will learn how some common authentication protocols work and about the ways that they can be put at risk by password cracking techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication/authorization

A
EAP
Challenge Handshake Authentication Protocol 
     (CHAP)
Password Authentication Protocol (PAP)
802.1X
RADIUS
Single sign-on (SSO)
Security Assertions Markup Language (SAML)
Terminal Access Controller Access Control System 
     Plus (TACACS+)
OAuth
OpenID
Kerberos
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EAP

A

Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Challenge Handshake Authentication Protocol (CHAP)

A

Authentication scheme developed for dial-up networks that uses an encrypted three-way handshake to authenticate the client to the server. The challenge-response is repeated throughout the connection (though transparently to the user) to guard against replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Password Authentication Protocol (PAP)

A

Obsolete authentication mechanism used with PPP. PAP transfers the password in plaintext and so is vulnerable to eavesdropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.1X

A

A standard for encapsulating EAP communications over a LAN (EAPoL) to implement port-based authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RADIUS

A

A standard protocol used to manage remote and wireless authentication infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Single sign-on (SSO)

A

An authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Assertions Markup Language (SAML)

A

An XML-based data format used to exchange authentication information between a client and a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Terminal Access Controller Access Control System Plus (TACACS+)

A

An AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OAuth

A

Standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider.

17
Q

OpenID

A

An authentication layer that sits on top of the OAuth 2.0 authorization protocol.

18
Q

Kerberos

A

A single sign-on authentication and authorization service that is based on a time-sensitive ticket-granting system.

19
Q

Access control schemes

A
Attribute-based access control (ABAC)
Role-based access control
Rule-based access control
MAC
Discretionary access control (DAC)
Conditional access
Privilege access management
Filesystem permissions
20
Q

Attribute-based access control (ABAC)

A

An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.

21
Q

Role-based access control

A

An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.

22
Q

Rule-based access control

A

A non-discretionary access control technique that is based on a set of operational rules or restrictions to enforce a least privileges permissions policy.

23
Q

MAC

A

Access control model where resources are protected by inflexible, system defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).

24
Q

Discretionary access control (DAC)

A

Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner (or owners).

25
Q

Conditional access

A

Conditional access is an example of rule-based access control. A conditional access system monitors account or device behavior throughout a session. If certain conditions are met, the account may be suspended or the user may be required to reauthenticate, perhaps using a 2-step verification method. The User Account Control (UAC) and sudo restrictions on privileged accounts are examples of conditional access. The user is prompted for confirmation or authentication when requests that require elevated privileges are made. Role-based rights management and ABAC systems can apply a number of criteria to conditional access, including location-based policies (docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview).

26
Q

Privilege access management

A

A privileged account is one that can make significant configuration changes to a host, such as installing software or disabling a firewall or other security system. Privileged accounts also have rights to log on network appliances and application servers.

Privileged access management (PAM) refers to policies, procedures, and technical controls to prevent the malicious abuse of privileged accounts and to mitigate risks from weak configuration control over privileges. These controls identify and document privileged accounts, giving visibility into their use, and manage the credentials used to access them (beyondtrust.com/resources/glossary/privileged-access-management-pam).

27
Q

Filesystem permissions

A

An access control model can be applied to any type of data or software resource but is most closely associated with network, file system, and database security. With file system security, each object in the file system has an ACL associated with it. The ACL contains a list of accounts (principals) allowed to access the resource and the permissions they have over it. Each record in the ACL is called an access control entry (ACE). The order of ACEs in the ACL is important in determining effective permissions for a given account.