5. Identity And Access Mangement Flashcards

1
Q

What does IAAA stand for?

A

Identification, Authentication, authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define identity and access management

A

Services/policies/procedures for managing a digital identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the regulation that dictates that security controls must be audited annually?

A

Sarbanes-Oxley (SOX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define authorization

A

Confirms that the Authenticated entity (user) has the privileges and permissions necessary to access what they want to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are CRUD operations?

A

Create, Read, Update and Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should privileges always be based on?

A

Least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define accountability

A

Tracing an action to a subject (user).

- also known as auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must accountability include to be legitimate?

A
  1. Identify the subject
  2. The action
  3. Object on which the action was performed
  4. Timestamp
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is DAC?

A

Discretionary Access Control

  • security of objects is at the owners control and granted through an ACL.
  • identity based
  • common on commercial products and all client based systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is MAC?

A

Mandatory Access Control

  • data owner cannot grant access
  • OS makes granting choice based on security label system.
  • subjects label must dominate the objects label.
  • rules are configured by security officer and enforced by OS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is RBAC?

A

Role Based Access Control.

- good at fixing authorization creep.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can you authenticate your identity with?

A
  1. Something you know
  2. Something you have
  3. Something you are

Having two of these is called Strong Authentication, or Two-factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are static biometric measures?

A

Biometric markers that do not change.

I.e. your fingerprint, hand geometry, iris, retina pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are dynamic biometrics?

A

Biometrics that are based on your behavioral traits.

I.e. voice, gait, signature, keyboard cadence, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a type 1 accuracy error?

A

FRR - false rejection rate
Legitimate user is barred from access.
Usually happens when system identifies too much info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a type 2 accuracy error?

A

FAR - false acceptance rate
An imposter is allowed in.
Happens when system does not evaluate enough info.

17
Q

What is the CER?

A

Crossover Error Rate.
When FRR and FAR are the same. This is an accurate description of how accurate the system is.

Lower value is better.

18
Q

What is AS?

A

Authentication Server
A part of the Kerberos SSO.
It allows authentication of the user and issues a TGT.

19
Q

What is a TGT?

A

Ticket granting token

20
Q

What is a TGS?

A

Ticket Granting Server.

Where a TGT is exchanged for a ticket to a particular user for access to a particular service.

21
Q

What is a KDC?

A

Key Distribution Center

Part of the Kerberos SSO, the KDS runs the TGS and AS.

22
Q

What are Rule Based Access Controls?

A

Specific rules indicate what can and cannot transpired between a subject and object.

Also called non-discretionary

23
Q

What are Constricted User Interfaces?

A

Restrict users access by not allowing them to see certain data or have certain functionality.
Has a menu
Think of the kiosks at work.

24
Q

What are Content Dependent Access Controls?

A

Access is determined by the type of data.

I.e email filters looking for SSN length numbers.

25
Q

What are context dependent Access Controls?

A

System reviews a situation then makes a decision based on access.
I.e. a firewall

26
Q

What does RADIUS stand for?

A

Remote Authentication Dial-in User Service.

Authentication protocol that authenticates and authorized users.

Protected communication between server and client.

27
Q

What protocol does RADIUS use?

A

UDP

TACACS+ and Diameter user TCP.

28
Q

What are the steps to protect Emanation Security?

A

Faraday Cages
White Noise generators
Control Zones