Section 14: Authentication and Authorization Flashcards

1
Q

Mandatory Access Control

A

Mandatory Access Control
▪ Uses security labels to determine which users are authorized to access a resource

Complex to configure and expensive to maintain
Generally reserved for high security systems
Anything that is now explicitly allowed is denied by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discretionary Access Control (DAC)

A

Discretionary Access Control (DAC)
▪ Allows the resource owner to specify which users can access each
resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Role-Based Access Control

A

Role-Based Access Control
▪ Allows an administrator to assign roles and permissions to access each resource

Windows Domain, Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attribute-Based Access Control

A

Attribute-Based Access Control
▪ Relies on a set of characteristics of an object to make access control
decisions
● User Attributes, username, role, group
● Environment attributes: time of access, location of data
● Resource attributes: creation date, file name, file owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication Protocols

A

o Remote Authentication Dial-In User service (RADIUS)
▪ Cross-Platform protocol that authenticates and authorizes users to
services, and accounts for their usage

o Terminal Access Controller Access Control System Plus (TACACS+)
▪ Cisco-proprietary protocol that provides separate authorization,
authorization, and account services

o Diameter
▪ Peer-to-peer protocol created as a next-generation version of RADIUS

o The Lightweight Directory Access Protocol (LDAP)
▪ Cross-platform protocol that centralized info about clients and objects on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardware Security Module (HSM)

A

▪Generates and stores cryptographic keys and is less susceptible to
tampering and insider threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attestation

A

o Allows enterprise security personnel to determine if a change to the baseline has been made

o Attestation Integrity Key
▪ Determines the integrity of a TPM chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly