Lesson 7 Flashcards

1
Q

IAM

A

• Subjects - Users or software that request access
• Objects - Resources such as networks, servers, and data
Four main processes:
• Identification - Associating a valid subject with a computer/network account
• Authentication - Challenge to the subject to supply a credential to operate the account
• Authorization - Rights, permissions, or privileges assigned to the account
• Accounting- Auditing use of the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Kerberos vs NTLM

A

There preferred system for network authentication in windows. NTLM (Network Lan Manager) is iegacy network authentication

In Windows, SSO is provided by the Kerberos framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure Shell

SSH

A

With SSH, the user can be authenticated using cryptographic keys instead of a
password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kerberos Authentication

A
• Single sign-on 
authentication and 
authorization provider
• Clients
• Application servers
• Key Distribution Center 
(KDC)
• Authentication Service –
Ticket Granting Ticket
• Ticket Granting Service –
Service Ticket
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PAP vs CHAP vs MS-CHAP authentication

A

Kerberos is designed to work over a trusted local network. Several authentication
protocols have been developed to work with remote access protocols, where the
connection is made over a serial link or virtual private network (VPN).

PAP is bad

CHAP is good. MS-CHAP is microsofts version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spraying

A

using multiple credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Brute force, dictionary, Hybrid

A

• Brute force attack
• Generate every possible combination to match a hash
• Large output space and sufficiently long input password increase time
required

• Dictionary attack and rainbow tables (salt defends against dictionary)
• Use a dictionary to test common words or phrases first
• Rainbow tables assist dictionary attacks against Windows password
databases by precomputing hash chains
• Using salt means hash chains cannot be pre-computed

  • Hybrid attack
  • Dictionary and brute force
  • Fuzzing of dictionary terms (james1, james2, tom1, tom2,…)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Password crackers

A
  • Cain and L0phtcrack

• Hashcat (linux)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smart Card Authentication

A
• Kerberos-based smart card logon
• Card readers
• ***Card stores user’s private key and 
certificate 
• Use of card is protected by a PIN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trusted Platform Module (TPM)

A

Trusted Platform Module (TPM) - • Virtual smart cards usually embedded in CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware Security Module (HSM)

A

A hardware security module (HSM) is a network appliance

designed to perform centralized PKI management for a network of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

USB Key

A

smart card in USB form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Extensible Authentication Protocol (EAP) /IEEE 802.1X

A

smart card process is used for kerberos authentct. authentication may be required for other contexts (wireless network, vpn, etc)

EAP is very flexible fromwork for deploying multiple types of authoriztion. designed for interoperability

IEEE 802.1X Port-based Network Access Control (NAC) - allows or denys devices from gettng on the network (ethernet switch port, wirelss acces poing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EAP-TLS vs PEAP vs EAP FAST

A
  • EAP-TLS
    ○ Transport layer security
    **Both sides server and subject most have certicat
    • Protected PEAP ***Only the server needs a a certificat
      EAP-FAST - no certificat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Supplicant

A

the device requesting access to the network, such as a user’s PC or laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RADIUS

A

The Remote Authentication Dial-in User Service (RADIUS) standard is published as
an Internet standard. There are several RADIUS server and client products.

17
Q

NAS Device

A

Network access server (NAS)—edge network appliances, such as switches, access
points, and VPN gateways. These are also referred to as RADIUS clients or authenticators.

18
Q

• TACACS+

A

Whereas RADIUS can be used for this network
appliance administration role, the Cisco-developed Terminal Access Controller
Access-Control System Plus (TACACS+) is specifically designed for this purpose

  • Centralizing administrative logins for network appliances
  • Reliable TCP transport (over port 49)
  • Data encryption
  • Discrete authentication, authorization, and accounting functions
19
Q

OAUTH

A

System based not on just a password boe also on 2 or 3 factor authentication or 2 step verification. Two algorithms:

• HMAC-based One-time Password
Algorithm (HOTP)
• Time-based One-time Password
Algorithm (TOTP)

20
Q

2-Step Verification

A
  • Transmit a code via an out-of-band channel
  • Short message service (SMS)
  • Phone call
  • Push notification
  • Email account
  • Possibility of interception