4: 2 Authentication Flashcards
What are the three types of authenticators
Something you know, something you are, something you have
Something you know
Most popular i.e. passwords, security questions
Something you are
Biometrics
Something you have
Physical possession of device i.e. keyFOB, smartphone
Authentication Attributes
Weaker versions of the 3 main authenticators - somewhere you are, something you can do, someone know you, something you exhibit
FAR
False Acceptance Rate - misidentifies as an authorized user
FRR
False Rejection Rate - Fails to identify an authorized user
HOTP
HMAC-based One-Time Password - based on hardware tokens
TOTP
Time-based one time code - time of day with shared secret and only valid until the code works (both must have synched clocks)
SMS and Phone-based authentication
Weaker than HOTP and TOTP
Static Code
Becomes something you know
PAP
Password authentication protocol, not encrypted
CHAP
Challenge handshake authentication protocol - both server and user know password, challenge value sent from server to client. client merging the hash and value to create a value to send to the server. Server then computers hash itself and validates client’s response.
MS-CHAP
Microsoft’s CHAP version, has been broken and is insecure.
MS-CHAPv2
Microsoft’s second version of CHAP, has been broken and is insecure.
Federated Identity Management
Individual has accounts across multiple systems that share identity information, reducing number of accounts needed (i.e. Facebook, Twitter logins)
SSO
Single-Sign On - Shares authentication across systems so logins persist
One Way Trust
Domain 1 trusts Domain 2, but D2 doesn’t trust D1
Two Way Trust
D1 and D2 trust each other
Transitive Trust
Trust Relationships that transfer across domains - automatically inferred
Non-Transitive Trust
Trust relationships that do not transfer and aren’t automatically inferred
RADIUS Protocols
Remote Access Dial In User Service - Centralized server could authenticate modem servers across the country
Disadvantages of Radius
User Datagram Protocol is unreliable, and the entire sequence isn’t encrypted
TACACS
Terminal Access Controller Access Control System