Chapter 16: Identity and Access Fundamentals Flashcards

(44 cards)

1
Q

identification claim

A

username, account number, email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

authentication information

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

authorization

A

determines if a subject is given rights to carry out requested actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

three main types of factors for authentication

A

something a person knows (password), something a person has (token), something a person is (fingerprint)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

two additional factors

A

somewhere a person is (geolocation), something a person does (keystroke behavior)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

salts

A

random values added to plaintext passwords prior to hashing to add complexity and randomness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cognitive passwords

A

fact or opinion based questions, typically based on life experiences, used to verify an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type I biometric authentication error

A

a legitimate individual is denied access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type II error

A

an impostor granted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CER

A

crossover error rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

crossover error rate of a biometric authentication system

A

the point at which the false rejection rate (Type I errors) is equal to the false acceptance rate (Type II errors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ownership-based authentication

A

something a person owns, such as a token device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

token device

A

password generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

password generator

A

token device; handheld device with a display synchronized with an authentication server and displays to the user a one-time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OTP

A

one-time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

synchronous token device

A

requires the device and authentication service to advance to the next OTP in sync with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

asynchronous token device

A

requires a challenge/response scheme to authentication the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

memory card

A

holds information but cannot process information

19
Q

smart card

A

holds information and has the hardware and software to process that information

20
Q

password manager

A

password vault; solution to remembering a myriad of complex passwords

21
Q

JIT

A

just-in-time access

22
Q

just-in-time access

A

provisioning method which elevates users to the necessary privileged access to perform a specific task

23
Q

ASOR

A

authoritative system of record

24
Q

authoritative system of record

A

hierarchical tree-like structure system which tracks subjects and their authorization chains

25
most commonly implemented directory services
Microsoft Windows Active Directory (AD)
26
directory services
map resource names to their network addresses
27
LDAP
Lightweight Directory Access Protocol
28
SSO
single sign-on
29
federated identity
portable identity and its associated entitlements which allow a user to be authenticated across multiple IT systems and enterprises
30
IDaaS
Identity as a Service
31
Identity as a Service
a type of Software as a Service (SaaS) offering which provides SSO, FIM, and password management services
32
three identity management services approaches
on-premise, cloud-based, and hybrid
33
biometrics
most expensive and most protection
34
passwords
least protection, cheapest
35
challenge/response protocol with token device
authentication service generates a challenge, smart token generates a response based on the challenge
36
mutual authentication
user authenticates to system and system authenticates to user
37
identification or authentication access control
biometrics
38
directories used in identity management are
hierarchical and follow the X.500 standard
39
Lightweight Directory Access Protocol
allows subjects and applications to interact with the directory; apps make LDAP request to the directory for information about a user, and users make LDAP requests for information about specific resources
40
password synchronization
allows user to maintain one password across multiple systems
41
biometric input for identity verification
app identifies points of data as match points, algorithm used to process the match points and translate it to numeric value, authentication approved or denied when the database value is compared with the end user input entered into the scanner
42
FRR
false rejection rate; rejects authorized individual
43
FAR
false acceptance rate; accepts impostor
44
Type I error
FRR