Security + Flashcards
what are the three parts to any form of authentication ?
Identification - usually a username
Password - or something you know
Authorization - what you can do
what is MFA ?
more than one factor to authenticate
what are the different factors that can be used when authenticating someone with MFA
something you know, password
Something you have, keyfob
Something you are - biometrics
what are some of the different authentication attributes ?
Something you do
Your signature
Something you exhibit
Typing speed
Someone you know
Certificates from a server
Somewhere you are
Physical location
what is identification ?
claiming an identity
what is authentication?
proving an identity
what is authorization?
permitting specific actions once a user has been authenticated
what does it mean when we hear the word accounting in security ?
essentially auditing, we want to be able to account for or audit the activity that the user executed when they were signed in
when can authorization occur ?
authorization can only occur after the authentication
what do we need to do proper accounting and auditing ?
To do these we need to have separate user accounts or else it will look like the same user id doing everything
what are some different type of auditing ?
Resource access, such as signings into a system
Failed login attempts
Changes to files or database records, has it been tampered with ?
why is username and password security risky ?
Security risk because they are both something you know and can be guessed
Mitigation for this is to use different passwords for different resources
what is a password vault ?
A way of storing passwords something like last pass is an example of this
what are the characteristics of one time passwords ?
- Unique password generated for single use, static code sent via email or SMS text
- TOTP stands for time-based one-time password,
○ this means the password is only valid for a certain amount of time - HOTP stands for HMAC one-time password
HMAC encrypts a hash to ensure authenticity
- TOTP stands for time-based one-time password,
what are the characteristics of certification based authentication ?
PKI certificates are issued by a trusted authority to an individual entity
what are the characteristics of SSH public key encryption
This means you would sign in with a username and password as well as a private key
The public key is stored on the server
The private key is stored with you on your station
what are some of the characteristics of bio metrics ?
- This is something that is unique to you as an individual
- Fingerprints
- Retina scan
- Iris scans
- Facial recognition
- Voice recognition
- Vein analysis
- Gait analysis how you move or walk
what are some mistakes that can happen with biometrics ?
False acceptance - makes a mistake
False rejection rate
Cross over error rate
what are some of the characteristics of credential policies ?
defines who gets access to what, like what employees get access to what in an ORG
- We might have a credential policy that is related to contractors
- Device policies, example need to use a VPN tunnel
- Credential policies for service accounts
We can have credential policies for administrator or root accounts, this is sometimes called PAM or privileged access management
what is attribute based access control ?
Looks at the attributes of a user or device to determine what permissions they have to a resource Example Date of birth, or maybe we will look at the device type
what is role based access control ?
A role is a collection of related permissions
Example we could create a roll to have someone access files in the cloud
What is rule based access control ?
Uses conditional access policies
For example have to be signed in using MFA have to be using an iPhone have to be signing in from Canada
what is Mandatory access control ?
- We assign labels or identifiers to resources
○ Devices, files, databases, network ports etc
- Permission assignments are based on resource labels and security clearance
what is discretionary access control ?
Data custodian sets permissions at their discretion