Identity Flashcards

1
Q

single sign-on, or SSO

A

can streamline access to resources. Users must
remember only one ID and password that can be used across multiple sites, applications and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

federated identity model

A

person’s identity is authenticated in a trusted centralized service. All other
services that require knowledge of the person’s identity refer to the trusted centralized service to acquire
the person’s identity. This is often done using tokens that are generated by the trusted service and passed
to the providing service by the user. This reduces the exposure of personal information and the intrusion
of malicious authenticators. A common example of this is single sign-on (SSO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

byod risks

A

These risks may
include the potential exposure of employee personal information, greater exposure to malware, potential
device theft, and the use of incorrectly configured devices. There is also a risk that individuals who access
the network remotely cannot necessarily be verified as employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how to reduce byod risks

A

administrators
should allow only approved personal devices, provide notice to and obtain consent from users, limit data
transfers and types of access, mandate device controls, and limit social access. To reduce the risk of
unauthorized access, administrators should limit network access, require manual authentication, and use
multifactor authentication. Other mitigations to consider include the use of virtual private networks,
demilitarized zone networks, and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

context of authority

A

Control over the access to resources on a network is based on the context in which the employee is
connected to the network. The broader the context of authority, the more challenging it will be to manage
the privacy of resources (more data, more privacy policies, and more interactions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

idea of least privilidge

A

idea of least privilege focuses on granting individuals and services the lowest possible access rights to
resources that still allows them to perform required duties. This practice minimizes the ability of the user
to access unnecessary resources or execute unneeded programs. Following a least-privilege regime can
minimize what information can be accessed by hackers or malware, since hackers or malware will be
restricted to the data that the person who was hacked has access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

multifactor authenticatoin

A

reduces the risk of undesired access to
resources, especially sensitive resources, by requiring more than one method of authentication to verify a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Domain-based Message Authentication, Reporting & Conformance:

A

an email
authentication, policy and reporting protocol that protects a domain from being used in phishing
emails, spoofing, and other email scams and cyberthreat activities. If an email passes the
authentication, then it will be delivered and can be trusted; if not, then the email will be
quarantined or rejected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

digital rights management

A

ensure that digital content is only delivered to those
who are authorized to receive it. It can also limit what assigned users can do with the content. For
example, a person may be permitted to read a document, but not allowed to print it, email it to
others, copy content from it or modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

identifiability

A

is the extent to which a person can be identified and high identifiability in conjunction
with certain actions may put an individual at a higher risk for identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly