2. Access Control Flashcards

1
Q

access control process

A

identification
authentication
authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is authentication

A

prove you are who you claim to be by:

  1. knowledge (what you know)
  2. Token (what you have)
  3. biometrics (what you are)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

knowledge based authentication

A

passwords

passphrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

password bad practices

A
  1. reused
  2. easily guessed
  3. shared
  4. written down
  5. password manager: single point of failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

password entropy

A

measure of uncertainty

  • password of K bits has pow(2, K) possibilities
  • password of length L from B chars has pow(B, L) possibilities
  • entropy H = log2(pow(B,L))
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attacking passwords

A
  1. brute force
    - try all combinations
    - use account lock out to prevent brute force
    - need to exfiltrate data before brute force
  2. reverse brute force
    - try one password on multiple accounts
  3. dictionary
    - contains commonly used passwords
    - stored in plain text
  4. rainbow tables
    - contains commonly used passwords
    - stored in hashes
  5. social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

password hardening

A
  1. formulate good passwords
  2. store in password managers to help remember
  3. use passphrases
  4. secure storing of passwords
    - encrypt password (minimum)
    - hashed password (ok..)
    - hashed password + salt (best)
  5. enforce security policies
  6. 2FA
  7. educate users on best practices and increase awareness
  8. maintain correct access rights
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are tokens

A

physical devices to aid authentication

  1. e tokens
  2. RFID tags
    - used in logistics, prison, but weak to side channel attack
  3. smart cards
    - tamper proof
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

types of biometrics

A

physical

behavioural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

requirements for biometrics

A
  1. university
    - everyone must have that characteristic trait
  2. distinctiveness
    - characteristics should be sufficiently different
  3. permanence
    - characteristics should be sufficiently invariant
  4. collectability
    - characteristics can be measured quantitatively
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

acceptability of biometrics

A

authentication needs to be accepted by end users

  • convenience
  • duration of authentication
  • invasion of privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

accuracy of biometrics

A
  1. false/ true accept rate
  2. retina scanning
  3. iris scanning
  4. facial recognition
  5. fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

behavioural

A

how you type/walk
can change over time
people may have similar behaviours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

voice recognition

A

is both behavioural and physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

biometrics advantages

A
  1. unique data, difficult to replicate
  2. fast and convenient
    - no issue of missing tokens, forget passwords
  3. scalable
    - just add data to DB
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

biometrics disadvantages

A
  1. unrecoverable if compromised
    - user cannot change their body
  2. expensive
  3. privacy concerns
17
Q

authorisation: types of access control

A
  1. discretionary
    - owner, group, others
  2. role-based
    - principle of least privilege
  3. mandatory
    - defined integrity levels
    - user integrity level compared when logged in
18
Q

principle of least privilege

A

best security privilege

limit privileges to minimum necessary to perform task