Chapter 2 first half Flashcards
(44 cards)
Occurs when users claim (or profess) their identity with identifiers such as usernames or e-mail addresses.
Identification
Users provide their identity with this
IE password.
Authentication
AAA
Authentication, Authorizations, and Accounting
Work together with identification to provide a comprehensive access management system.
Grants users access to resources based on their proven identity.
Authorization
Tracks user activity and record it in logs.
Accounting
Allows security professionals to recreate the events that preceded and security incident.
Audit Trail
An authentication factor that typically refers to a shared secret, such as a password or PIN. This is the least secure form of Authentication.
Something You Know
GPO
Group Policy Object
Enforce Password History
Remembers past passwords and prevents the user from using previously used passwords. IE if set to 24, prevents user from using previous 24 passwords.
Maximum Password Age
Defines when users must change their password. IE if set to 45 days, their password will expire in 45 days.
Minimum Password Age
Defines how long users must wait before they change their password.
Minimum Password LEngth
Enforces character length of password.
Store Passwords using Reversible Encryption
Reversible encryption stores the password in such a way that the original password can be discovered.
Authentication factor that refers to something you can physically hold.
Something You Have
Credit-card sized cards that have an embedded microchip and a certificate.
Smart Card
Embedded Certificate
Holds a users private key (only accessible by the users) and is matched with a public key (available to others).
PKI
Public Key Infrastructure
Supports issuing and managing certificates.
Common Access Cards
Specialized type of smart card used by the DOD.
Personal Identity Verification Card
PIV
Specialized type of smart card used by the US Federal Agencies.
Token (or Key Fob)
An electronic device the size of a remote key for a car, including a LCD that displays a number, which changes periodically. This password is a rolling password, for one time use.
HMAC
Hashing-based Message Authentication Code
Uses a hashing function and cryptographic key for many different cryptographic functions.
HOTP
HMAC One-Time Password
An open standard used for creating one-time passwords, algorithm combines a secret key and an incrementing counter, and used HMAC to create a hash of the result. Then it converts the result into an HOTP value of 6-8 digits.
TOTP
Time-based One-Time Password
Similar to HOTP, but uses a timestamp instead of a counter, they typically expire after 30 seconds.
Authentication factor that uses biometrics for authentication.
Something You Are