Week 9 Flashcards

1
Q

What is the relationship between entities and identities?

A

A many-to-many relationship where one entity can have multiple identities and one identity can be used by multiple entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of an Identity Management (IdM) System or Identity Provider (IdP)?

A

Manages identities (creation, maintenance, expiration) and links identities to entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between Identity and Identifier (ID)?

A

Identities usually have a unique identifier to prevent ambiguity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the NIST definition of Identity Management?

A

IdM manages the creation, use, and termination of electronic identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to ISO/IEC 24760-1:2019, what does Identity Management focus on?

A

Managing the lifecycle, type, and metadata of identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the defined functions of IdM according to ITU-T X.1250 (2009)?

A
  • Identity assurance (identifiers, credentials)
  • Authentication & Policy enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is Authentication important in Identity Management?

A

It identifies the entities being authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Authorization & Access Control define?

A

Who gets access under which conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Attributes in the context of Identity Management?

A

Characteristics tied to an entity (self-claimed or assigned by an authority).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Credentials used for?

A

Authentication (e.g., digital certificates, SIM cards, ATM cards).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the problem addressed by Federated Identity Management (FIM)?

A

Managing multiple identities across systems is complex and error-prone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Single Sign-On (SSO) in the context of FIM?

A

One login for multiple services using federations for centralized authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who handles Authentication in FIM?

A

Identity Providers (IdPs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who manages Authorization in FIM?

A

Service Providers (SPs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Trust Model in FIM?

A
  • Users/SPs trust IdPs
  • IdPs/SPs do not trust users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the definition of Accountability according to IETF RFC 4949?

A

Ensures actions of a system entity can be traced to hold them responsible.

17
Q

What does NIST define Accountability as?

A

Guarantees actions are uniquely linked to an entity.

18
Q

Why is Accountability important?

A
  • Legal Compliance
  • Business Needs (quality assurance, monitoring)
  • Ethical/Social Responsibility
  • Personal and Organizational Security
19
Q

What is an Audit Service?

A

Tracks events and user actions.

20
Q

What is a Security Audit?

A

Independent review of system controls.

21
Q

What are Audit Trails?

A

Recorded logs of system events.

22
Q

What types of events are logged?

A
  • Login attempts
  • Authorization actions
  • System changes
23
Q

Where can logs be stored?

A
  • Local devices
  • Remote servers
  • Databases
  • Cloud
24
Q

What does the UK Computer Misuse Act (CMA) 1990 criminalize?

A

Unauthorized access, hacking, and malware creation.

25
What is the purpose of the UK Serious Crime Act (SCA) 2015?
Adds penalties for cyber attacks that cause serious damage.
26
What does the UK Investigatory Powers Act (IPA) 2016 regulate?
Electronic surveillance by intelligence agencies.
27
What is the focus of the UK Online Safety Act (OSA) 2023?
Targets illegal content, child protection, and cybercrime.
28
What does the EU eIDAS Regulation (2014) provide?
Electronic identification & trust services for secure transactions.
29
What does the EU NIS Directive (2016) strengthen?
Cybersecurity across EU member states.
30
What is the purpose of the UK Telecommunications (Security) Act 2021?
Emerging cybersecurity regulations.
31
What is Security Information & Event Management (SIEM)?
Centralized logging & monitoring of security incidents.
32
What does a Security Operations Center (SOC) do?
Real-time cybersecurity monitoring and response.
33
What are Cybersecurity Incident Response Teams (CSIRT) focused on?
Responding to cybersecurity incidents.
34
What is Self-Sovereign Identity (SSI)?
Users control their own digital identities.
35
What are Verifiable Credentials (VCs) used for?
Identity verification.
36
What regulation implements Self-Sovereign Identity in 2024?
EU Digital Identity (EUDI) Regulation.