2.4 - Authentication and Authorization Flashcards

1
Q

What is a directory service?

A

It keeps all of the organization’s usernames and passwords in a single database (ex. AD).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define federation and a federated network.

A

Federation : Providing network access to to others outside of the organization, not just employees - partners, suppliers, customers, etc.

Federated Network: Allows for authentication and authorization between two organizations (logging in with google credentials).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is attestation?

A

Proving that the hardware is really yours or that the hardware is something that can be trusted interacting with or within a network.

Remote attestation: The device provides an operational report to a verification server. It is encrypted and digitally signed with the TPM. An IMEI or other unique hardware component can be included in the report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How might one authenticate with SMS?

A

After you provided your login information, you receive an SMS to a predefined phone number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some of the security issues that exist with SMS authentication?

A

1) The phone number can be reassigned to a
different phone
2) SMS messages can be intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How might one authenticate with a push notification?

A

A similar process to SMS. The authentication factor is pushed to a specialized app. This is usually on a mobile device. More secure that SMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the security issues that exist with push notification authentication?

A

1) Applications can be vulnerable
2) Some push apps send in the clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How might one authenticate with an authentication app?

A

A pseudo-random token generator on your phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define TOTP.

A

Time-based One-Time Password algorithm

A secret key and the time of day are used to generate a token for authentication. The secret key is configured ahead of time, and timestamps are synchronized via NTP.

Google, Facebook, Microsoft, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define HOTP.

A

HMAC-based One-Time Password algorithm

Keyed- hash message authentication code (HMAC)

One- Time passwords are generated, once a session and each authentication attempt. The keys are based on a secret key and a counter. The hash is different every time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How might one use a phone call to authenticate?

A

A voice call provides the token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the security issues with using a phone call to authenticate?

A

1) Phone call can be intercepted or forwarded
2) Phone number can be added to another phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some examples of static codes for authentication?

A

Personal Identification Number (PIN)
Password
Passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How might one use a smart card to authenticate?

A

A smart card (something you have) can be used. It includes an integrated circuit, and it can be through contact or contactless. You must have the physical card.

Can be used in conjunction with other authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some examples of biometric factors?

A

Fingerprint scanner, Retinal scanner, iris scanner, voice recognition, facial recognition

Gait analysis: Identify a person based on how they walk

Veins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the five types of authentication factors?

A

1) Knowledge Factor
- Something you know
2) Possession Factor
- Something you have
3) Inherence Factor
- Something you are
4) Location Factor
- Somewhere you are
5) Behavior Factor
- Something you exhibit

17
Q

Define the False Acceptance Rate (FAR) in terms of biometrics.

A

The likelihood that an unauthorized user will be accepted. You can increase sensitivity to counter this.

18
Q

Define False Rejection Rate (FRR) in terms of biometrics.

A

The likelihood that an authorized user will be rejected. Might be too sensitive.

19
Q

Define Crossover error rate (CER) in terms of biometrics.

A

The overall accuracy of a biometric system or the rate at which FAR and FRR are equal. The sensitivity should be adjusted to equalize both values.

20
Q

What is the AAA framework?

A

1) Identification
-This is who you claim to be
- Username
2) Authentication
3) Authorization
4) Accounting

21
Q

What are the features of cloud-based authentication security?

A

Third-party can manage platform
Centralized Platform
Automation options with API integration
May include additional options (for a cost)

22
Q

What are some of the features of an On-premises authentication system?

A

Internal monitoring and management
Internal expertise
External access must be granted and managed

23
Q

List three authentication factors.

A

1) Something you know
2) Something you have
3) Something you are

24
Q

List four authentication attributes.

A

1) Somewhere you are
2) Something you can do
3) Something you exhibit
4) Someone you know

25
Q

What are some examples of Something you know?

A

Password
PIN
Pattern

26
Q

What are some examples of Something you have?

A

Smart card
USB token
Hardware or software tokens (can be on a mobile
phone)
Your phone

27
Q

What are some examples of Something you are?

A

Biometric
- Usually stores a mathematical representation of
your biometric
- Difficult to change

28
Q

What are some examples of the attribute Somewhere you are?

A

Location
IP address can be used to gauge location
GPS
Mobile device location

29
Q

What are some examples of the attribute Something you can do?

A

Handwriting
Signature

30
Q

What are some examples of the attribute Something you exhibit?

A

Gait analysis
Typing analysis

31
Q

What are some examples of the attribute Someone you know?

A

Digital signature
Web of trust
Social Factor

32
Q
A