Identity And Access Management Flashcards

1
Q

List the 3 key concepts

A
  1. Authentication
  2. Authorization
  3. Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Authentication

A

validating who a user claims to be
- something you are
- something you have
- something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Authorization

A

Giving someone permission to do or access something
- give user access to resource
- happens after authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Accounting

A

process of measuring the resource and the consumption
- time logged in
- data they access/changed
- make sure access is as intended
- verify access only to correct accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some methods of authentication?

A

biometrics
built in on many devices
token (card, message)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Identity Governance

A

process for managing access to resources via a centralized solution
- check user’s token
- provides access to right resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Identity Provider

A

services that confirms identity
- trusted source that can create, store, and manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of Identity Provider

A
  • Azure Active Directory Accounts
  • Microsoft Accounts
  • Google
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Single Sign-On

A

used to gain access to multiple services via one sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the User benefits of SSO

A
  • cross site navigation
  • increased productivity
  • reduce password fatigue
  • more secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Admin benefits of SSO

A
  • standard process across resources
  • improved new security
  • a single ID across multiple systems
    • granting and deleting users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is token forwarding

A

the token follows you across systems
- not all systems allow this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List some SSO Providers (6)

A
  1. Okta Identity Cloud
  2. OneLogin Unified Access Management Platform
  3. JumpCloud Directory as a Service
  4. Ping Intelligent Identity Platform
  5. Idaptive
  6. Microsoft Azure Active Directory (AD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Access Control Attacks

A

intruders will try to defeat, bypass, or trick access controls in order to reach their target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List 5 Attack Objectives

A
  1. Guess credentials
  2. Malfunction of access controls
  3. Bypass access controls
  4. Replay known good logins
  5. Trick people into giving up credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Script Injection

A

Insertion of scripting language characters into application input fields

17
Q

Define Data Remanence

A

data that remains after it has been deleted

18
Q

List 4 examples of Data Remanence

A
  1. Deleted hard drive files
  2. Erased files
  3. Reformatted hard drive
  4. Discarded / lost media; USB, backup tapes, CDs
19
Q

What is the countermeasure for data remanence

A

improve media physical controls

20
Q

Define Denial of Service (DoS)

A

actions that cause target system to fail thereby denying service to legitimate users
- specifically crafted input that causes application malfunction
- large volume of input that floods application

21
Q

define Distributed DoS (DDoS)

A

large volume of input from many of sources

22
Q

what is the countermeasure for DoS

A

input filters, patches, high capacity

23
Q

define dumpster diving

A

literally going through company trash in the hopes that sensitive printed documents were discarded that can be retrieved

24
Q

what is the countermeasure for dumpster diving

A

on-site shredding

25
Q

define eavesdropping

A

interception of data transmissions
- network sniffing
- wireless network sniffing

26
Q

what are the countermeasures for dumpster diving

A

encryption, stronger encryption

27
Q

define enamation

A

electromagnetic radiation that eliminates from computer equipment
- network cabling
- crt monitors
- wifi networks

28
Q

what are the countermeasures of emanation

A

shielding, twisted pair network cable, LCD monitors, lower power or eliminate wifi

29
Q

what are the countermeasures for social engineering and phishing

A

security awareness training

30
Q

define password cracking

A

obtain / retrieve hashed passwords from target

31
Q

what is the countermeasure to password cracking?

A

frequent password changes, controls on hashed password files