Identity and Access Management Flashcards
Access Provision Lifecycle
only setup account for those who require them
review account data for error/inconsistencies
audit access authorization/failures
remove access when necessary
Identification
Positive/Negative Identification
Authentication
Requires a key piece of information that only the users knows - aka password
Authorization
tied closely to principle of least privileges
Types of Authentication
Know, Have, Are, Somplace(GPS/Geo Location)
Passphrases
compared to strong password - less entropy per character but more over entropy due to length
Password guessing
guessing password
Password cracking
determine cleartext password based on stole password hashes
Dictionary attack
word list, hash to see if matches
Hybrid
begin with word list and adds/changes characters
Brute force
attempts every possible password
All combinations
Rainbow tables
calculate hash for every password
Salt makes rainbow ineffective
Salt
random number that is hashed along with the salt
Tokens
Counter Based - asynchronous dynamic password token
Time-Based - Synchronous dynamic password token
Synchronous dynamic password token
same time (RSA token)
Asynchronous dynamic password token
Password available, no time limit
Biometrics Identifiers
Fingerprints Palm scan Hand geometry Voice print Retina pattern Iris scan Facial recognition
False Reject Rate (FRR)
Type I Error
It’s me but rejects me
False Accept Rate (FAR)
Type II Error
It’s not me but accepts it - intruder
Remember Type II is worst than Type I
Crossover Error Rate (CER)
Point where False Reject Rate and False Accept Rate are equal
Equal Error Rate
Enrollment (Biometrics)
Needs to enroll in 2 minutes
Throughput (Biometrics)
10 subjects/min - once ever 6 seconds