4: 2 Authentication Flashcards

1
Q

What are the three types of authenticators

A

Something you know, something you are, something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Something you know

A

Most popular i.e. passwords, security questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Something you are

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Something you have

A

Physical possession of device i.e. keyFOB, smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication Attributes

A

Weaker versions of the 3 main authenticators - somewhere you are, something you can do, someone know you, something you exhibit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FAR

A

False Acceptance Rate - misidentifies as an authorized user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FRR

A

False Rejection Rate - Fails to identify an authorized user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HOTP

A

HMAC-based One-Time Password - based on hardware tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TOTP

A

Time-based one time code - time of day with shared secret and only valid until the code works (both must have synched clocks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMS and Phone-based authentication

A

Weaker than HOTP and TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Static Code

A

Becomes something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PAP

A

Password authentication protocol, not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CHAP

A

Challenge handshake authentication protocol - both server and user know password, challenge value sent from server to client. client merging the hash and value to create a value to send to the server. Server then computers hash itself and validates client’s response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MS-CHAP

A

Microsoft’s CHAP version, has been broken and is insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MS-CHAPv2

A

Microsoft’s second version of CHAP, has been broken and is insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Federated Identity Management

A

Individual has accounts across multiple systems that share identity information, reducing number of accounts needed (i.e. Facebook, Twitter logins)

17
Q

SSO

A

Single-Sign On - Shares authentication across systems so logins persist

18
Q

One Way Trust

A

Domain 1 trusts Domain 2, but D2 doesn’t trust D1

19
Q

Two Way Trust

A

D1 and D2 trust each other

20
Q

Transitive Trust

A

Trust Relationships that transfer across domains - automatically inferred

21
Q

Non-Transitive Trust

A

Trust relationships that do not transfer and aren’t automatically inferred

22
Q

RADIUS Protocols

A

Remote Access Dial In User Service - Centralized server could authenticate modem servers across the country

23
Q

Disadvantages of Radius

A

User Datagram Protocol is unreliable, and the entire sequence isn’t encrypted

24
Q

TACACS

A

Terminal Access Controller Access Control System

25
TACACS+
Best version of access control similar to RADIUS but uses TCP (transmission control protocol) to fully encrypt authentication system
26
Kerberos
Access Control that is core protocol of Microsoft Access Directory. Ticket based authentication system.
27
What are the 4 parties in a Kerberos Access Request
End User - Authentication Server, Ticket Granting Server, Service
28
LDAP
Lightweight Directory Access Protocol - Allows means to query a centralized directory service like Microsoft AD
29
Kerberos Port
88
30
LDAP Port
389
31
Secure LDAP port
636
32
NT LAN Manager
Old version of access protocol for windows that uses hashes, but weak encryption open to pass the hash vulnerability.
33
SAML
Security Assertion Markup Language- allows browser based single sign-on.
34
Who are the 3 parties in a SAML Request
Principal, Identity Provider, Service Provider
35
OAuth, Open ID
Identity Protocols
36
OpenID Connect
Authentication protocol that proves your identity
37
OAuth
Authentication protocol that isn't for authorization, brings you to a 3rd party OAuth login screen where correct authentication redirects you to the initial party screen.
38
Certificate-based AUthentication
Users a public-private key pair to grant access, same strength as a password but can be automated.