2.4 Summarize authentication and authorization design concepts Flashcards

(34 cards)

1
Q

Directory Service

A

Similar to a database but is used for fast and efficient data retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LDAP

A

Lightweight Directory Access Protocol
The authentication, authorization, control for Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AWS Managed Microsoft AD

A

This is related to Microsoft Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Federation/Identity Federation

A

Management system for identifying and gaining access to multiple enterprises with one log in credential. Third party Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attestation

A

Organization checking credentials that it was supplied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TOTP

A

Time-based One-Time Password
A password that is time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HOTP

A

HMAC-based One-Time Password
A algorithm password that is authenticated with a server. (Hash password that can have credentials for a long time. Think of IG one time passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SMS (authentication)

A

Short Message Service
a Multifactor authentication by sending a verification to your phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Token Key/Dynamic Key

A

Token Keys rely on something physical you have like a card that has pin code. Dynamic key is the same thing but changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Static Codes

A

Codes that don’t change. Standard is that all static codes have crypto graphic protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication Application

A

A app such as “Google Authentication” that issues a one time password for user authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Push Notifications

A

A notification will appear on the users devices and the user can deny or allow access from the notification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phone Calls (Authentication)

A

You receive a phone call to authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Smart Card Authentication

A

Card that has a chip (ICC) and within that ICC there is a long cryptographic token that cant be copied. Also there is pin associated with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Biometrics

A

getting authentication through unique body parts on a human.
Two part process:
Enrollment: turning biological parts into numeric value, which the template
Authenticate: Numeric value validated by computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fingerprint

A

using the finger print to authenticate by the patterns on a finger

17
Q

Retina

A

scanning the blood vessels in the eye for authentication

18
Q

Iris

A

Scanning the Pigmentation in the eye.
Issues: can be done at a distance without knowledge
the Iris can change due to medical conditions

19
Q

Facial

A

Forward facing camera scans your face
issues: someone can put your face up to the camera to unlock

20
Q

Voice

A

Voice recognition to authenticate.
Issues: FRR and FAR

21
Q

Vein

A

Scan vein patterns to authenticate.

22
Q

Gait Analysis

A

Identify how someone walks to authenticate. Can be used in crowds too.

23
Q

FAR

A

False Acceptance Rates
rate of false positives within a system.

24
Q

FRR

A

False Rejection Rate
False negatives within a system.

25
CER
Crossover Error Rate A balanced combination of FAR and FRR and ideal for systems.
26
MFA
Multifactor Authentication and Attributes Related to multiple/two way authentication.
27
Factors
Things that compromise items of proof.
28
Something you Know
Passwords, PIN, Patterns. ( in your brain)
29
Something You Have
Security tokens, device, smart card (something physical)
30
Something You Are
Biometrics (finger prints, Iris, Voice)
31
Attributes Related to authentication.
Something you can do Something you Exhibit Something You know Focus on the elements associated with the user
32
AAA
Authentication, Authorization, and Accounting. the three make up the AAA framework for security
33
Somewhere you are
Authentication based on location.
34