Summarize authentication and authorization design concepts Flashcards

1
Q

Authentication methods

A
Directory services
Federation
Attestation
Technologies
Smart card authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Directory services

A

What is directory services in cyber security?
Directory services are software systems that store, organize and provide access to directory information in order to unify network resources. Directory services map the network names of network resources to network addresses and define a naming structure for networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Federation

A

A collection of realms (domains) that have established trust among themselves. The level of trust may vary, but typically includes authentication and may include authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attestation

A

Attestation is a mechanism for software to prove its identity. The goal of attestation is to prove to a remote party that your operating system and application software are intact and trustworthy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Technologies

A
Time-based onetime password (TOTP)
HMAC-based one-time password (HOTP)
Short message service (SMS)
Token key
Static codes
Authentication applications
Push notifications
Phone call
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Time-based onetime password (TOTP)

A

Its a temporary password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HMAC-based one-time password (HOTP)

A

Put in layman’s terms, HMAC-based One-time Password algorithm (HOTP) is an event-based OTP where the moving factor in each code is based on a counter. Each time the HOTP is requested and validated, the moving factor is incremented based on a counter.

An algorithm that generates a one-time password using a hash-based authentication code to verify the authenticity of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Short message service (SMS)

A

Texting the temporary password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Token key

A

A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Static codes

A

There are also simpler token keys and smart cards that simply transmit a static token programmed into the device. For example, many building entry systems work on the basis of static codes. These mechanisms are highly vulnerable to cloning and replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication applications

A

Authentication applications are downloaded to your device and generate secure, six-digit codes you use to sign in to your accounts. … Download and install an authentication app to your device. Some popular options include: Android options: Google Authenticator, Authy, LastPass, 1Password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Push notifications

A

Push Notification Authentication enables user authentication by sending a push notification directly to a secure application on the user’s device, alerting them that an authentication attempt is taking place. Users can view authentication details and approve or deny access, typically via a simple press of a button.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phone call

A

the code is delivered as an automated voice call to the registered phone number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Smart card authentication

A

means programming cryptographic information onto a card equipped with a secure processing chip. The chip stores the user’s digital certificate, the private key associated with the certificate, and a personal identification number (PIN) used to activate the card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Biometrics

A
Fingerprint
Retina
Iris
Facial
Voice
Vein
Gait analysis
Efficacy rates
False acceptance
False rejection
Crossover error rate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fingerprint

A
17
Q

Retina

A

an infrared light is shone into the eye to identify the pattern of blood vessels. The arrangement of these blood vessels is highly complex and typically does not change from birth to death, except in the event of certain diseases or injuries.

18
Q

Iris

A

matches patterns on the surface of the eye using near-infrared imaging and so is less intrusive than retinal scanning (the subject can continue to wear glasses, for instance) and a lot quicker.

19
Q

Facial

A
20
Q

Voice

A
21
Q

Vein

A
22
Q

Gait analysis

A
23
Q

Efficacy rates

A

Calculated efficiency

24
Q

False acceptance

A

Biometric assessment metric that measures the number of unauthorized users who are mistakenly allowed access.

25
Q

False rejection

A

Biometric assessment metric that measures the number of valid subjects who are denied access.

26
Q

Crossover error rate

A

Biometric evaluation factor expressing the point at which FAR and FRR meet, with a low value indicating better performance.

27
Q

Multifactor authentication (MFA) factors and attributes

A

Factors

Attributes

28
Q

Factors

A

Something you know
Something you have
Something you are

29
Q

Attributes

A

Somewhere you are
Something you can do
Something you exhibit
Someone you know

30
Q

Authentication, authorization, and accounting (AAA)

A

It is a framework used to control and track access within a computer network.

31
Q

Cloud vs. on-premises requirements

A