Security Plus - Chapter 8 Flashcards

1
Q

Identity

A

The sets of claims made about a subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Subject

A

People, applications, devices, systems, or organizations that require access to something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attributes

A

A broad range of information about a subject:
Name
Age
Location
Job Title

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ways to claim a user’s identity

A

Username - associated with an identity
Certificate - stored on systems or paired with a storage device to identify systems, devices, or individuals
Token - A physical device that may generate a code, plug in a USB, or connect via Bluetooth to present a certificate.
SSH key - Cryptographic representations of identity that replaces a username and password
Smartcard - An embedded chip either used with a chip reader device or contactless is a cryptographic card with the ability to generate key pairs on the card itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

Verifies that a user is who they claim that they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

Verifies that a user is provided the proper access that is applied to their account. When combined with authentication protocols, this allows a user to access resources, systems, and other objects based on what the user is permitted to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensible Authentication Protocol (EAP)

A

An authentication framework that is commonly used for wireless networks. Types of EAP implementations:
EAP-TLS
LEAP
EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Challenge Handshake Authentication Protocol (CHAP)

A

An authentication protocol that uses an encrypted challenge and three-way handshake to send credentials. It is designed to provide more security than earlier protocols like PAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

802.1X

A

An IEEE standard for network access control (NAC) used for authentication of devices that want to connect to a network. Supplicants send authentication requests to authenticators such as network switches, access points, or wireless controllers, which connect to the authentication server for validation. These authentication servers are typically RADIUS servers which rely on a backend directory, typically LDAP or Active Directory as a source for identity information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote Authentication Dial-In User Service (RADIUS)

A

Operates via TCP or UDP in a client-server model. It sends passwords that are obfuscated by a shared secret and MD5 hash, which is not rather secure. It is usually encrypted using IPSec tunnels for the internal traffic. IT is one of the most common authentication, authorization, and accounting systems for network devices, wireless networks, and other services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Terminal Access Controller Access Control System Plus (TACACS+)

A

A Cisco designed extension that uses TCP traffic to provide authentication, authorization, and accounting services. It provides full-packet encryption as well as granular command controls, allowing individual commands to be secured as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberos

A

A protocol for authenticating service requests between trusted hosts across an untrusted network like the Internet. It uses authentication to shield the authentication traffic. Kerberos users are composed of three main elements:
Primary - The username
Instance - Differentiates similar primaries
Realms - Consists of groups of users. Realms are separated by Trust boundaries and have distinct Kerberos key distribution centers (KDC’s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kerberos Process

A

A client using Kerberos to access a service, the client requests an authentication ticket, ticket-granting ticket (TGT). An authentication server checks the client’s credentials and responds with the TGT, which is encrypted using the secret key of the ticket-granting service (TGS). When the client wants to use a service, the client sends the TGT to the TGS (which is usually also the KDC) and includes the name of the resource it wants to use. The TGS sends back a valid session key for the service, and the client presents the key to the service to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Single Sign-On

A

Allowing users to log in to multiple systems by using a single identity without reauthenticating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lightweight Directory Access Protocol (LDAP)

A

An organizational directory of information about the organization. Commonly deployed as part of an identity and access management infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Assertion Markup Language (SAML)

A

An XML based open standard for Internet-based systems to exchange authentication and authorization information. Usually used between identity providers and service providers.
Used for Federated authentication purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OpenID

A

An open standard for decentralized authentication. OpenID identity providers can be leveraged for third-party sites using established identities. Ex. Google logins to Gmail then also provides access to YouTube, Drive, etc.
Used for Federated authentication purposes.

18
Q

OAuth

A

An open standard for authorization that ensures users can determine what information to provide to third-party applications and sites without sharing credentials.
Used for authorization of access to protected resources.

19
Q

Federation

A

Creates a trusted relationship between organizations and third parties, such as partners or application vendors, so they can share identities and authenticate users across domains.

20
Q

Identity Providers (IdP)

A

Manage the lifecycle of digital identities from creation through maintenance to eventual retirement of the identity in the systems and services it supports. Part of the federated identity deployments when paired with relying parties that trust the IdP to handle authentication and then rely on that authentication to grant access to services.

21
Q

Federation Common Terminology

A

Principal - The user
Identity Providers - Provides identity and authentication services via an attestation process in which the IdP validates that the user is who they claim to be.
Service Providers - Provides services to users whose identities have been attested to by an identity provider and then perform the requested function.
Attestation - Formal verification that something is true. A user is who they say they are because they have presented an identifier and are authorized by the IdP.
Relying Party - (RP) - Requires authentication and identity claims from an IdP

22
Q

NIST Password Guidelines

A

Use a Password Manager
Locking accounts after multiple failed attempts
Employ multi-factor authentication
Emphasize length of password
Allow ASCII and Unicode characters in passwords
Monitor passwords to ensure no common, previously compromised, or obvious word selections (username, company name, etc.) are permitted.
Limit on how often a user can use a previously used password
Expiration dates so there is a required timeframe to update a user’s password
Age settings of a password to ensure a user does not reset their password continually until they get back to their preferred former password.

23
Q

Passwordless Authentication

A

Authentication relies on something you have, security tokens, security keys, one-time password authenticator, or certificates, or something you are like biometrics.

24
Q

Multi-Factor Authentication

A

A multi-step account login process that requires users to enter more information than just a password. Must contain more than one of the four factors:
Something you know - Password, PIN, or answer to a security question
Something you have - Smartcard, security token, security key, one-time password authenticator
Something you are - Relies on physical characteristics - Fingerprint, retina scan, voice validation, and typing speed or pattern
Somewhere you are - Location factor, based on the current location. GPS, network location, and other data can be used to ensure that users who are in that location can authenticate.

25
Q

One-Time Passwords (OTP)

A

An automatically generated numeric or alphanumeric string of characters that authenticates a user for a single transaction or login session.

26
Q

Time-Based One Time Password (TOTP)

A

Uses an algorithm to derive a one-time password using the current time as part of the code-generation process. Code is valid for a set period of time.

27
Q

Hash-Based Messaage Authentication Code (HMAC)-Based One-Time Password (HOTP)

A

A hash-based message authentication code (HMAC) uses a seed value that both the token or HOTP code-generation application and the validation server use, as well as a moving factor. Pressing a button on a device, which generates a code that is available for a one-time use. Similar to hardware token.

28
Q

Short Message Service One-Time Password (SMSOTP)

A

When a user has their mobile device number setup to receive a validation code that is available for a one-time validation of their authentication.

29
Q

Biometrics

A

Something you are:
Fingerprints
Retina Scanning
Iris recognition
Facial recognition
Voice recognition
Vein recognition
Gait analysis

30
Q

Biometric Error Rates

A

Type 1 Error - False rejection rate (FRR)
- False rejections mean that a legitimate biometric measure was presented and the
system rejected it.
Type 2 Error - False acceptance rate (FAR)
- False acceptances mean an illegitimate biometric measure was presented and
was accepted when it shouldn’t have been.

31
Q

Receiver Operating Characteristic (ROC)

A

This compares the FRR against the FAR of a system, typically as a graph. For most systems, as you decrease the likelihood of false rejection, you will increase the likelihood of false acceptance. Determining where the accuracy of the system should be set to minimize false acceptance and prevent false rejection is an important element in the configuration of the biometric system.

32
Q

Account Types

A

User accounts
Privileged/Administrator accounts
Shared/Generic accounts
Guest accounts
Service accounts

33
Q

Account Provisioning

A

One of the phases of the account lifecycle when accounts are created in the system. The account is created, permissions and other attributes are assigned to the account. During provisioning, the process of identity proofing should occur to ensure that the person that the account is being created for is the person that is claiming the account.

34
Q

Onboarding

A

The process from the Human Resources department that includes the hiring of an individual, account creation, ensuring the users have the proper permissions for their role, and provide appropriate training to the employee.

35
Q

Account Deprovisioning

A

One of the phases of the account lifecycle when accounts are deleted/terminated from the system. This process includes removing the account, permissions, access to data, files, and other artifacts as required by the organization policy. This helps ensure that dormant accounts are not available for an attacker to compromise.

36
Q

Permission Creep

A

When a user is moved into different roles within a system, and the previous role permissions are not removed from the user’s current role permissions.

37
Q

Privileged Access Management (PAM)

A

Provides organizations the ability to manage and secure access to their most critical systems, applications, and data. Privileged accounts have elevated permissions and capabilities, allowing these users to perform various administrative tasks, access sensitive information, and make changes that typical users cannot.
Has the below characteristics:
- Just-in-time access (JIT) - Permissions that are granted and revoked only when needed. Prevents users from maintaining continuous access when it is unneeded.
- Password vaulting - Allows users to access privileged accounts without needing to know a password.
- Ephemeral account access - Manages temporary accounts with limited lifespans.

38
Q

Access Control Schemes

A

Determines which users, services, and programs can access various files or other objects that they host.
- Mandatory Access Control (MAC) - Relies on the operating system to enforce control as set by a security policy administrator. Does not allow a user the ability to grant access to files or change security policies that are set centrally.
- Discretionary Access Control (DAC) - Assigns owners for objects like files and directories, then allows those owners the ability to delegate rights and permissions to those objects as they desire.
- Role-Based Access Control (RBAC) - Rely on roles that are then matched with privileges that are assigned to those roles. This provides a quick provisioning process for users based on the job title they are given.
- Rule-Based Access Control (RuBAC) - Applied using a set of rules or access control lists (ACLs) that apply to various objects or resources. Ex. Firewall ruleset
Attribute-Based Access Control (ABAC) - Relies on policies that are driven by attributes of the users. Can be very complex based on combinations of multiple attributes of a user.

39
Q

Role-Based Access Controls (RBAC) Rules

A

Role Assignment - Subjects can use only the permissions that match a role they have been assigned.
Role Authorization - The subject’s active role must be authorized for that subject. Prevents a subject from taking on roles they shouldn’t have access to do.
Permission Authorization - Subjects can use only permissions that their active role is allowed to use.

40
Q

Access Control Concepts

A

Time-of-Day restrictions - Limits when activities can be performed by a user. Logon hour restrictions can be configured within a Windows system account via Active Directory
Least privilege - States that accounts and users should only be provided the minimum set of permissions and capabilities that are necessary to perform their role or job function.

41
Q

Filesystem Permissions

A

Determine which accounts, users, groups, or services can perform actions like reading, writing, and executing files. Understand both Linux and Windows file permissions.