Week 8 Flashcards

1
Q

What does AAA stand for in ISM?

A

Authentication, Authorization, and Accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is authentication in information security?

A

Verifying the truth of an entity’s claimed identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three main authentication factors?

A

Knowledge-based (e.g., password), Possession-based (e.g., smart card), Inherence-based (e.g., fingerprint).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is multi-factor authentication (MFA)?

A

Using two or more authentication factors to increase security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give an example of MFA in a banking system.

A

Password + SMS OTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is context-based authentication?

A

Authentication that considers environmental factors like location or device behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is risk-based authentication?

A

Authentication that adjusts based on perceived risk (e.g., high risk = MFA required).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is password hashing important?

A

It prevents attackers from retrieving original passwords if the database is leaked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does salting do in password storage?

A

Adds a random value to passwords before hashing to defend against rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the most secure method of password storage?

A

Hashed + salted + key stretching (e.g., using bcrypt or Argon2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are common user behaviors that weaken password security?

A

Reusing passwords, choosing weak passwords, writing them down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of possession-based authentication methods?

A

USB keys, smart cards, authenticator apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the risks of biometric authentication?

A

Privacy issues and no fallback if compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between authentication and authorization?

A

Authentication verifies identity; authorization defines what actions the identity can take.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name and describe the 4 access control models.

A

DAC: Object owner controls access (e.g., Google Drive).
MAC: Central authority assigns access based on labels (e.g., classified info).
RBAC: Based on roles in an organization (e.g., admin).
ABAC: Based on attributes like age or location (e.g., age-restricted sites).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the difference between entities and identities in identity management?

A

Entities are real users/devices; identities are their system representations.

17
Q

Why is identity management important in ISM?

A

It enables authentication, controls access, and supports accountability/auditing.