Implementing Access Control 5 Flashcards

0
Q

Describe LDAP

A

Lightweight Directory Access Protocol
A directory access protocol that runs over TCP/IP networks. The services schema defines the taskss the clients can and can’t perform while access a directory database, the form the directory query must take and how the directory server will respond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is directory services

A

A network service that stores identify information about all the objects in a particular network. Provides user access control to directory objects and network resources. Can be used to centralize security and to control access to individual network resources
The structure of the directory is controlled by a schema that defines rules for how objects are created to support the specific needs of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe LDAPS

A

Secure LDAP
a method of implementing LDAP using Secure Sockets Layer/Transport Layer Security encryption protocols to prevent eavesdropping and man in the middle attacks. Forces both client and sever to establish a secure connection before transmissions can occur. Closes if connection is interrupted or dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the most common directory services available

A

Microsoft Active Directory. Uses ACLs Access Control Lists find resources anywhere on the network

Sun Java System Directory Server.

openDS. Open source.

OpenLDAP. Free open source

Open Directory. Owned by Apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe remote access methods

A

RAS remote access server. gateway connection
Access as part of internal network

VPN remote access
Access through intermediate network like the Internet. Uses tunneling through encapsulate data to conceal the info of the packet inside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common remote access protocols

A

PPP. Point to Point protocol.
PPTP. Point to point tunneling protocol. Not secure
L2TP layer 2 tunneling protocol used with IPSec to provide encryption.
SSTP. Secure socket tunneling protocol. Uses HTTP over SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is HOTP

A

HMAC-based One Time Password
An algorithm that generates one time passwords OTP using a hash based message authentication code HMAC to ensure the authenticity of a message.
Only invalidated after used successfully. An attacker could gain access to a password that isn’t used then the system can be compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is TOTP

A

Timed HMAC based One Time Password
Improves upon HOTP algorithm by introducing a time based factor to the onetime password authentication. Addresses the HOTP security flaw by generating and invalidating new passwords in specific increments of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is PAP

A

Password Authentication Protocol
An authentication protocol that sends user IDs and passwords as plaintext
Used when a remote client is connecting to a non windows server that does not support strong password encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe CHAP

A

Challenge Handshake Authentication Protocol
Legacy encryption authentication protocol that is used to provide access control for remote access. Used to connect to non Microsoft servers.
Uses a combination of Message digest 5 hashing and a challenge response mechanism. No passwords sent over the network. Hash sent
More secure that PAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Guidelines for securing remote access

A

Set up a VPN for offsite employees to connect to your internal network through the Internet
Use secure tunneling protocols like L2TP with IPSec in VPN
avoid insecure tunneling protocols like PPTP
Implement one time password authentication for access to highly sensitive data
Implement TOTP to mitigate session hijacking.
Avoid using PAP and CHAP and other outdated remote access protocols with no adequate protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is PGP

A

Pretty Good Privacy
A publicly available email security and authentication utility that uses a variation of public key cryptography to encrypt emails.
The sender encrypts the email contents and encrypts the key used to encrypt the contents. Encrypted key sent with the email and the receiver decrypts the key function them uses the key to decrypt the contents.
Also used for digital signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is GPG

A

Gnu Privacy Guard.

A free open source version of PGP that provides equivalent encryption authentication services. Email security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe RADIUS

A

Remote authentication Dial In user service
Only encrypts passwords.
An Internet standard protocol that provides centralized remote access authentication authorization and auditing services.
The remote access server is known as Network Access Server NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is diameter

A

An authentication protocol that improves using RADIUS by strengthening its weaknesses. Is a stronger protocol but not widespread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe TACACS

A

Terminal Access Controller Access Control System
and
TACACS+
Protocols provide centralized authentication and authorization service for remote users. More secure and scalable that RADIUS. It accepts login requests and authenticates the access credentials of the user. Supports multi-factor authentication.
Process wide encryption for authentication

16
Q

Describe Kerberos

A

An authentication service based in a time sensitive ticket gaining system. Uses SSO single sign on
Used to manage access control to many different services using one centralized authentication server.

17
Q

What is SAML

A

Security Assertion Markup Language
Data format based on XML used to exchange authentication info between a service, an identity provider, and the requesting client.
Defines security request information.
Purpose is to provide web based SSO authentication across many different protocols.

18
Q

Describe the Kerberos Process

A

User logs on to the domain
User requests a TGT ticket granting ticket form authentication server
The authenticating server responds with a time stamped TGT
user present TGT Back to the authenticating server and requests a service ticket to access a specific resource
The authenticating server responds with a service ticket
The user presents the service ticket to the resource
The resource authenticates the user and allows access

19
Q

What is identity management

A

Created with Specific characteristics of individuals or resources
Assign identity with access controls
Prevent identity theft
Protection of personally identifiable information PII

20
Q

What is account management.

A

Refers to the processes, functions, and policies used to effectively manage user accounts within an organization with the proper controls in place

21
Q

What are account privileges

A

Permissions granted to users that allow them to perform actions and access systems and services on the network.
Can be assigned by user or group.
Keep privileges well documented.
User assigned privileges are unique to each user and configured to a specific job function
Group assigned privileges each user in the group have the same permissions. Best practice to assign by group.

22
Q

Describe an account policy

A

A document that includes an organizations requirements for account creation, account monitoring, and account removal.

23
Q

What is multiple accounts

A

Occur when one individual has several accounts for a system or resource. Accounts may differ depending on the level of access applied.

24
Q

Describe shared accounts

A

Accounts accessed by more than one user or resource. Associated with a specific role or purpose.
Can have anonymous and guest accounts
Temporary accounts
Admin accounts for multiple authorized professionals
Batch processing for easy automating.
Several risks
Lack of accountability and individual responsibility
Password changes

25
Q

What is account federation.

A

The practice of linking a single account and its characteristics across many different account management systems.
Provides a centralized account management structure and eliminates superfluous account info.

26
Q

To maintain and enforce the security needs of an organization strict account management security controls should be implemented and enforced.

A
User ID and password requirements
Account access restrictions
Account management guidelines 
Multiple account guidelines
Continuous monitoring
27
Q

Describe credential management

A

An application created to help users and organizations easily store and organize account user names and passwords.
Stored on an encrypted database on the local machine.
Only as strong as the passwords they store.
Should be used using multi factor authentication

28
Q

Describe group policy

A

Service in windows systems that proved several methods for managing security across a domain.Enforcing account password properties and lockout thresholds
Storing account passwords using reversible encryption.
Enforcing Kerberos
Auditing account management events
Assigning specific rights and controls to individual or group accounts