1- Mastering the Basics Flashcards
(31 cards)
Core Security Principles: Confidentiality
Confidentiality ensures that data is only viewable by authorized users. If there is a risk of sensitive data falling into the wrong hands, it should be encrypted to make it unreadable. Any data should be protected with access controls to enforce confidentiality.
Core Security Principles: Integrity
Integrity is used to verify that data has not been modified, and loss of integrity can occur through unauthorized or unintended changes. Hashing algorithms such as MD5, HMAC, or SHA1 can calculate hashes to verify integrity. A hash is simply a number created by applying the algorithm to a file or message at different times. The hashes are compared to each other to verify that integrity has been maintained.
Core Security Principles: Availability
Availability ensures that systems are up and operational when needed and often addresses single points of failure. You can increase availability by adding fault tolerance and redundancies such as RAID, clustering, backups, and generators. HVAC systems also increase availability.
Core Security Principles: Non-repudiation
Non-repudiation is used to prevent entities from denying they took an action. Digitally signed e-mail prevents individuals from later denying they sent it. An audit log provides non-repudiation since audit log entries include who took an action in addition to what the action was, where the action took place, and when it occurred.
Core Security Principles: Defense in Depth
Security is never “done.” Instead, security and IT professionals constantly monitor, update, add to, and improve existing methods. A single layer of security is easily beatable. Defense in depth employs multiple layers to make it harder for attacks to exploit a system or network.
Basic Risk Concepts: Risk/ Risk Mitigation
Risk is the likelihood that a threat will exploit a vulnerability. Risk mitigation reduces the chances that a threat will exploit a vulnerability by implementing controls.
Authentication Concepts: Identification, Authentication, Authorization
Identification occurs when a user claims an identity. Authentication occurs when the user proves the identity (such as with a password) and the credentials are verified. Authorization is granted to resources based on a proven identity.
Authentication Concepts: 3 Factors of Authentication
The three factors are: 1) Something you know (such as username and password), 2) Something you have (such as a smart card), and 3) Something you are (such as a fingerprint or other biometric identification).
Any 2+ is considered multifactor authentication.
Authentication Concepts: First Factor of Authentication
The first factor of authentication (something you know, such as a password or PIN) is the weakest factor. Passwords should be strong, changed regularly, never shared with another person, and stored in a safe if written down. Technical means (such as a technical password policy) should be used to ensure that users regularly change their passwords and don’t use the same passwords.
Authentication Concepts: First Factor of Authentication– Strong Passwords
Strong passwords use a mix of character types with a minimum password length such as eight or ten characters. The key space of a password is calculated as C ^ N where C indicates the number of possible characters in the password, and the N indicates the password length.
Authentication Concepts: First Factor of Authentication– Password History
Password history is combined with a minimum password age to prevent users from reusing the same passwords.
Authentication Concepts: First Factor of Authentication– Default Passwords
Many systems and devices have default passwords. A basic security practice is to change these defaults as soon as the system or device is installed.
Some administrators go a step further and add a dummy user account named “administrator.” This account has no permissions. If this account is discovered to be locked out, the administrator knows that someone was trying to guess the password.
Authentication Concepts: Second Factor of Authentication
The second factor of authentication (something you have, such as a smart card, key fob, or proximity card) is commonly combined with something you know. Smart cards have embedded certificates issued by a Public Key Infrastructure (PKI). Both smart cards and key fobs provide a significant level of secure authentication, especially when used with another factor of authentication (multifactor authentication).
Authentication Concepts: Second Factor of Authentication– Examples
The second factor of authentication (something you have, such as a smart card, key fob, or proximity card) is commonly combined with something you know. Smart cards have embedded certificates issued by a Public Key Infrastructure (PKI). Both smart cards and key fobs provide a significant level of secure authentication, especially when used with another factor of authentication (multifactor authentication).
Similarly, a personal identity verification (PIV) card is a specialized type of smart card used by United States federal agencies.
CACs and PIVs are specialized smart cards that include photo identification. They are used to gain access into secure locations, and can also be used to log onto computer systems.
Authentication Concepts: Third Factor of Authentication
The third factor of authentication (something you are, defined with biometrics) is considered the strongest method of authentication since it is the most difficult for an attacker to falsify. Physical biometrics (such as fingerprints) and behavioral biometrics (such as voice recognition) can be used to authenticate individuals.
Authentication Concepts: Third Factor of Authentication– Biometric Systems
Most biometric systems allow you to adjust the sensitivity of the system based on your needs.
You can determine the accuracy of a biometric system based on its crossover error rate (CER). The CER is the rate at which both the FAR and FRR are equal. A lower CER indicates a more accurate biometric system than one with a higher CER.
Authentication Concepts: Third Factor of Authentication– Biometric Systems: False Readings
2 possible false readings are:
- False acceptance: This is when a biometric system incorrectly identifies an unauthorized user as an authorized user. The False Accept Rate (FAR, also known as a type 2 error) identifies the percentage of times false acceptance occurs.
- False rejection: This is when a biometric system incorrectly rejects an authorized user. The False Reject Rate (FRR, also known as a type 1 error) identifies the percentage of times false rejections occur.
Authentication Services
- Kerberos
- Lightweight Directory Access Protocol (LDAP)
- Mutual Authentication
- Single Sign-On
- IEEE 802.1X
Authentication Services: Kerberos
Kerberos is a network authentication protocol within a Microsoft Windows Active Directory domain or a UNIX realm. It uses a database of objects such as Active Directory and a KDC to issue time-stamped tickets that expire after a certain period. Kerberos requires internal time synchronization and uses port 88.
Authentication Services: Single Sign-On
Single sign-on enhances security by requiring users to use and remember only one set of credentials for authentication. Once signed on using SSO, this one set of credentials is used throughout a user’s entire session. SSO can provide central authentication against a federated database for different operating systems.
Remote Access Services (RAS)
Remote Access Services (RAS) are used to provide access to an internal network from an outside source.
Remote Access Authentication
The different authentication mechanisms that may be used with remote access services are:
- Password Authentication Protocol (PAP): Passwords are sent in clear text so PAP is rarely used today.
- Challenge Handshake Authentication Protocol (CHAP): uses a handshake process where the server challenges the client. The client then responds with appropriate authentication information.
- MS-CHAP: Microsoft’s implementation of CHAP, which is used only by Microsoft clients.
- MS-CHAPv2: An improvement over MS-CHAP. A significant improvement of MS-CHAPv2 over MS-CHAP is the ability to perform mutual authentication.
- RADIUS (Remote Authentication Dial-In User Service): Radius provides a centralized method of authentication for multiple remote access services servers. RADIUS encrypts the password packets, but not the entire authentication process.
- TACACS and XTACACS. Terminal Access Controller Access-Control System (TACACS) is a remote authentication protocol that was commonly used in UNIX networks. Extended TACACS (XTACACS) is an improvement over TACACS developed by Cisco Systems and is proprietary to Cisco systems. Neither of these are commonly used today with most organizations using either RADIUS or TACACS +.
- TACACS + (Terminal Access Controller Access-Control System +): TACACS is an alternative to RADIUS and is proprietary to Cisco systems. A benefit of TACACS + is that it can interact with Kerberos allowing it to work with a broader range of environments including Microsoft. Additionally, TACACS + encrypts the entire authentication process (RADIUS encrypts only the password).
Remote Access Services: PAP (Password Authentication Protocol)
Password Authentication Protocol (PAP) is used with Point to Point Protocol (PPP) to authenticate clients.
A significant weakness of PAP is that passwords are sent in clear text, presenting a significant security risk.
PPP is primarily used with dial-up connections.
Remote Access Services: CHAP (Challenge Handshake Authentication Protocol)
Challenge Handshake Authentication Protocol has often been used to authenticate users in the past. However, it is often replaced with more secure forms of authentication today. The goal of CHAP is to allow the client to pass credentials over a public network (such as a phone or the Internet) without allowing attackers to intercept the data and later use it in an attack.