Section 4.6 Flashcards

1
Q

What is IAM?

A

Identity and Access Management (IAM) is responsible for determining access control for someone or something (human or non human). The entity has to authenticate and then the authorization is provided based on the entity. Once authenticated, the entities activity is monitored throughout its lifetime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SSO?

A

Single Sign On (SSO) is the process of providing credentials one time and getting access to all available and assigned resources. No additional authentication is required.
This is usually limited by time, for example the sign on will be valid for 24 hours and then the user would have to sign on again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is LDAP?

A

Lightweight Directory Access Protocol (LDAP) is a protocol that helps manage and access user information and other directory data in a network. It’s like a digital phone book, allowing users and applications to look up and manage resources, authenticate users, and enforce security policies, all from a centralized location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is SAML?

A

Security Assertion Markup Language (SAML) allows for the authentication of a user to a third party database.
SAML was not originally designed to work for mobile apps so this has been a large roadblock for SAML.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is OAuth?

A

OAuth is an authorization framework that determines what resources a user will be able to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Federation?

A

Federation allows network access without using a local authentication database. Third parties can establish a federated network, for example you can log in to an account using your facebook or gmail credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a MAC?

A

Mandatory Access Control (MAC) labels every object with a specific category for example Confidential, Secret, Top Secret, etc. This allows admins to determine which use gets access to which label, for example a director might have access to Secret objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DAC?

A

Discretionary Access Control (DAC) is used in most Operating systems and allows the owner of the data to give permissions on who gets access to the data. For example if a user creates a spreadsheet, they decide who gets access to this spreadsheet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is RBAC?

A

Role Based Access Control (RBAC) is based on the job function to provide permission to specific data. For example, a manager will have certain rights and permissions and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ABAC?

A

Attribute Based Access Control (ABAC) uses many different criteria to determine if a user has access to data or not. It evaluates many type of criteria for example IP address, relationship to data, time of day, user type, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is “something you know” when it comes to authentication?

A

It can be a password, pin, pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “something you are” when it comes to authentication?

A

It can be biometric authentication such as Fingerprint, Iris scan, voice print.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “somewhere you are” when it comes to authentication?

A

It is the location in which you are when youre trying to authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “something you have” when it comes to authentication?

A

It can be a smart card, access card, usb security key, sms text, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Just-in-time permissions?

A

Just in time permission allows someone like a technician to get admin access for a limited amount of time. This also applies the principle of least privilege to make sure the technician can only access what they need to perform. Just in time permission makes it possible to remove the permission after an amount of time has passed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly