Chapter 4: Access Control, Authentication, and Authorization Flashcards
Identification
Finding out who someone is
Authentication
Verifying identification
Out-of-band Authentication
The system you are authenticating gets info from public records and asks you questions to help authenticate you.
SFA
Single Factor Authentication
Mutual Authentication
Multiple parties authenticating each other
Layered Security/Defense in Depth
You should implement multiple layers of security
Operational Security
- Focuses on how an organization achieves its goals.
- Everything not related to design or physical security.
Security Token
- Similar to certificates, it is a small piece of data that holds a sliver of info about the user.
- Authentication system creates the token every time a user connects or when a session begins, and deletes it when they end.
Federation
A collection of computer networks that agree on standards of operation.
Federated Identity
Allows a user to have a single identity that they can use across different business units or businesses
Transitive Access
If A trusts B and B trusts C then A trusts C
Shiva Password Authentication Protocol (SPAP)
Like PAP, but encrypts username and password
Challenge Handshake Authentication Protocol (CHAP)
- Designed to stop man-in-the-middle attacks
- Periodically asks the client for authentication
Time-Based One-Time Password (TOTP)
Uses a time-based factor to create unique passwords
Usual minimum password length
8 characters
Generic Account
An account that is shared
SLIP
One of the first remote authentication protocols, which should not be used now
PPP
- No data security, but uses CHAP
- Authentication handled by Link Control Protocol (LCP)
- Encapsulates network traffic with Network Control Protocol (NCP)
RADIUS server
Allows authentication of remote and other network connections
TACACS+
Similar to RADIUS, authentication
Security Assertion Markup Language (SAML)
Open standard based on XML used for authentication and authorization
Lightweight Directory Access Protocol (LDAP)
Allows queries to be made of directories
Key Distribution Center (KDC)
- Authenticates a user, program, or system and provides it with a ticket used to show it has been authenticated.
- Used in Kerberos
Ticket Granting Ticket (TGT)
The ticket given by the KDC, listing the privileges of the user.