2.4 Summarize authentication and authorization design concepts Flashcards

1
Q

Directory Service

A

Similar to a database but is used for fast and efficient data retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LDAP

A

Lightweight Directory Access Protocol
The authentication, authorization, control for Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AWS Managed Microsoft AD

A

This is related to Microsoft Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Federation/Identity Federation

A

Management system for identifying and gaining access to multiple enterprises with one log in credential. Third party Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attestation

A

Organization checking credentials that it was supplied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TOTP

A

Time-based One-Time Password
A password that is time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HOTP

A

HMAC-based One-Time Password
A algorithm password that is authenticated with a server. (Hash password that can have credentials for a long time. Think of IG one time passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SMS (authentication)

A

Short Message Service
a Multifactor authentication by sending a verification to your phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Token Key/Dynamic Key

A

Token Keys rely on something physical you have like a card that has pin code. Dynamic key is the same thing but changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Static Codes

A

Codes that don’t change. Standard is that all static codes have crypto graphic protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication Application

A

A app such as “Google Authentication” that issues a one time password for user authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Push Notifications

A

A notification will appear on the users devices and the user can deny or allow access from the notification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phone Calls (Authentication)

A

You receive a phone call to authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Smart Card Authentication

A

Card that has a chip (ICC) and within that ICC there is a long cryptographic token that cant be copied. Also there is pin associated with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Biometrics

A

getting authentication through unique body parts on a human.
Two part process:
Enrollment: turning biological parts into numeric value, which the template
Authenticate: Numeric value validated by computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fingerprint

A

using the finger print to authenticate by the patterns on a finger

17
Q

Retina

A

scanning the blood vessels in the eye for authentication

18
Q

Iris

A

Scanning the Pigmentation in the eye.
Issues: can be done at a distance without knowledge
the Iris can change due to medical conditions

19
Q

Facial

A

Forward facing camera scans your face
issues: someone can put your face up to the camera to unlock

20
Q

Voice

A

Voice recognition to authenticate.
Issues: FRR and FAR

21
Q

Vein

A

Scan vein patterns to authenticate.

22
Q

Gait Analysis

A

Identify how someone walks to authenticate. Can be used in crowds too.

23
Q

FAR

A

False Acceptance Rates
rate of false positives within a system.

24
Q

FRR

A

False Rejection Rate
False negatives within a system.

25
Q

CER

A

Crossover Error Rate
A balanced combination of FAR and FRR and ideal for systems.

26
Q

MFA

A

Multifactor Authentication and Attributes
Related to multiple/two way authentication.

27
Q

Factors

A

Things that compromise items of proof.

28
Q

Something you Know

A

Passwords, PIN, Patterns. ( in your brain)

29
Q

Something You Have

A

Security tokens, device, smart card (something physical)

30
Q

Something You Are

A

Biometrics (finger prints, Iris, Voice)

31
Q

Attributes Related to authentication.

A

Something you can do
Something you Exhibit
Something You know

Focus on the elements associated with the user

32
Q

AAA

A

Authentication, Authorization, and Accounting.

the three make up the AAA framework for security

33
Q

Somewhere you are

A

Authentication based on location.

34
Q
A