Risk Management Lecture 4 Flashcards
What are the key processes to Access Control?
Identification
Authentication
Authorization
Accountability
In relation to access control, what is identification?
Identification can be boiled down to “Who are you?”
Like a username/drivers license id.
In relation to access control, what is Authentication?
Authentication is the process of verifying if you truly are who you identify as.
For example, this could be a password along with your username.
In relation to access control authentication, what are the 3 general factors that can be used?
a) something you know,
e. g., a security question only you have the answer, a password created by yourself, etc.
b) something you have,
e. g., a smartcard such as ATM banking card, a key your room, etc.
c) something you are,
e. g., your fingerprint, your face, your voice, etc. It is also known as “biometrics”
In relation to access control, what is Authorization?
This is a process of mapping what an individual has access to after identification and authorization.
For instance if you were an HR employee, having access to HR’s printer is normal, but access to the backend database for production wouldn’t.
In relation to access control, what is two-factor authentication?
“Two-factor authentication” means that two different methods mentioned above are used in combination for authentication.
A typical example would be a VPN application which requires both user ID/password and a physical token showing one-time passwords.
If a business manager tells you that his/her application needs to have strong authentication, you can interpret it as two-factor authentication required at a minimum.
In relation to access control, what is Accountability?
Another important security feature for identity & access management is to maintain audit logs and make sure non-repudiation can be established.
For example, during a incident investigation, you may need to prove that a person logged into a particular application and performed a specific action (e.g., deleted an important file) at a certain point in time.
If non-repudiation has been well established, then the identified person would not be able to deny that action!
In biometric systems, what kinds of physical attributes can we use for authorization?
a) palm scan – captures fingerprints of each finger
b) hand geometry – captures the shape of a person’s hand (e.g., shape, length, width of hand and fingers)
c) retina scan – captures the patter of the retina on the backside of the eyeball
d) iris scan – captures the colored portion of the eye that surrounds the pupil (most accurate biometric method as of today)!
In biometric systems, what kinds of behavioural characteristics can we use for authorization?
Handwriting
Signatures
Patterns of typing on a keyboard
In biometric systems, what is a Type I Error?
A system that rejects an authorized user.
Also known as a “false rejection rate(FRR)”
In biometric systems, what is a Type II Error?
A system that accepts unauthorized users that should have been rejected.
Also Called a “False acceptance Rate(FAR).
In biometric systems, what is Crossover Error Rate (CER)?
Rating that measures the percentage of Type I Errors = Type II Errors
Smaller CER value means a more accurate system.
What is IAM?
Identity and Access Management
Basically the means to assign a user with what they have access to.
What is Single sign-on(SSO)?
SSO is a way of verifying identity once, and having that accessible across numerous applications.
What is Role-based IAM?
Role-based IAM is a means of simplifying IAM to make it easier to give/take access away from users or groups of users.