MD2 Access controls and authentication systems Flashcards

1
Q

Access controls

A

he security controls that manage access, authorisation, and accountability of information.

When done well, access controls maintain data confidentiality, integrity, and availability. They also get users the information they need quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA Framework

A

The authentication, authorisation, and accounting framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication systems

A

Authentication systems are access controls that serve a very basic purpose. They ask anything attempting to access information this simple question: who are you?

Organizations go about collecting answers to these questions differently, depending on the objectives of their security policy. Some are more thorough than others, but in general, responses to this question can be based on three factors of authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three factors of authentication.

A

Knowledge
Ownership
Characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three factors of authentication.

Knowledge

A

The first is knowledge. Authentication by knowledge refers to something the user knows, like a password or the answer to a security question they provided previously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three factors of authentication.

Ownership

A

Another factor is ownership, referring to something the user possesses. A commonly used type of authentication by ownership is a one-time passcode, or OTP. You’ve probably experienced these at one time or another. They’re a random number sequence that an application or website will send you via text or email and ask you to provide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three factors of authentication.

Characteristics

A

Last is characteristic. Authentication by this factor is something the user is. Biometrics, like fingerprint scans on your smartphone, are example of this type of authentication. While not used everywhere, this form of authentication is becoming more common because it’s much tougher for criminals to impersonate someone if they have to mimic a fingerprint or facial scan as opposed to a password.

The information provided during authentication needs to match the information on file for these access controls to work. When the credentials don’t match, authentication fails and access is denied. When they match, access is granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Single sign-on, or SSO

A

Incorrectly denying access can be frustrating to anyone. To make access systems more convenient, many organizations these days rely on single sign-on. Single sign-on, or SSO, is a technology that combines several different logins into one. Can you imagine having to reintroduce yourself every time you meet up with a friend? That’s exactly the sort of problem SSO solves.

Instead of requiring users to authenticate over and over again, SSO establishes their identity once, allowing them to gain access to company resources faster. While SSO systems are helpful when it comes to speeding up the authentication process, they present a significant vulnerability when used alone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Weaknesses of SSO

A

Denying access to authorized users can be frustrating, but you know what’s even worse? Incorrectly granting access to the wrong user. SSO technology is great, but not if it relies on just a single factor of authentication. Adding more authentication factors strengthen these systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multi-factor authentication, or MFA,

A

Multi-factor authentication, or MFA, is a security measure, which requires a user to verify their identity in two or more ways to access a system or network. MFA combines two or more independent credentials, like knowledge and ownership, to prove that someone is who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSO and MFA

A

SSO and MFA are often used in conjunction with one another to layer the defense capabilities of authentication systems. When both are used, organizations can ensure convenient access that is also secure. Now that we covered authentication, we’re ready to explore the second part of the framework.

Next, we’ll learn about authorization!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly