MD2 The mechanisms of authorisation Flashcards

1
Q

AAA Framework

Authorisation

A

Authorization is linked to the idea that access to information only lasts as long as needed. Authorization systems are also heavily influenced by this idea in addition to another important security principle, the separation of duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Separation of duties

A

Separation of duties is the principle that users should not be given levels of authorization that will allow them to misuse a system. Separating duties reduces the risk of system failures and inappropriate behaviour from users.

For example, a person responsible for providing customer service shouldn’t also be authorized to rate their own performance. In this position, they could easily neglect their duties while continuing to give themselves high marks with no oversight. Similarly, if one person was authorized to develop and test a security system, they are much more likely to be unaware of its weaknesses.

Both the principle of least privilege and the concept of separating duties apply to more than just people. They apply to all systems including networks, databases, processes, and any other aspect of an organization. Ultimately, authorization depends on a system or user’s role. When it comes to securing data over a network, there are a couple of frequently used access controls that you should be familiar with: HTTP basic auth and OAuth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTP basic auth

A

Have you ever wondered what the HTTP in web addresses stood for. It stands for hypertext transfer protocol, which is how communications are established over network. HTTP uses what is known as basic auth, the technology used to establish a user’s request to access a server. Basic auth works by sending an identifier every time a user communicates with a web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HTTPS

A

Some websites still use basic auth to tell whether or not someone is authorized to access information on that site. However, their protocol is considered to be vulnerable to attacks because it transmits usernames and password openly over the network. Most websites today use HTTPS instead, which stands for hypertext transfer protocol secure. This protocol doesn’t expose sensitive information, like access credentials, when communicating over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OAuth

A

Another secure authentication technology used today is OAuth. OAuth is an open-standard authorization protocol that shares designated access between applications. For example, you can tell Google that it’s okay for another website to access your profile to create an account. Instead of requesting and sending sensitive usernames and passwords over the network, OAuth uses API tokens to verify access between you and a service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

API Token

A

An API token is a small block of encrypted code that contains information about a user. These tokens contain things like your identity, site permissions, and more. OAuth sends and receives access requests using API tokens by passing them from a server to a user’s device.

Let’s explore what’s going on behind the scenes. When you authorize a site to create an account using your Google profile, all of Google’s usual login protocols are still active. If you have multi-factor authentication enabled on your account, and you should, you’ll still have the security benefits that it provides. API tokens minimize risks in a major way. These API tokens serve as an additional layer of encryption that helps to keep your Google password safe in the event of a breach on another platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly