Chapter 4: Access Control, Authentication, and Authorization Flashcards

1
Q

Identification

A

Finding out who someone is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

Verifying identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Out-of-band Authentication

A

The system you are authenticating gets info from public records and asks you questions to help authenticate you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SFA

A

Single Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mutual Authentication

A

Multiple parties authenticating each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layered Security/Defense in Depth

A

You should implement multiple layers of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Operational Security

A
  • Focuses on how an organization achieves its goals.

- Everything not related to design or physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Token

A
  • Similar to certificates, it is a small piece of data that holds a sliver of info about the user.
  • Authentication system creates the token every time a user connects or when a session begins, and deletes it when they end.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Federation

A

A collection of computer networks that agree on standards of operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Federated Identity

A

Allows a user to have a single identity that they can use across different business units or businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transitive Access

A

If A trusts B and B trusts C then A trusts C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shiva Password Authentication Protocol (SPAP)

A

Like PAP, but encrypts username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Challenge Handshake Authentication Protocol (CHAP)

A
  • Designed to stop man-in-the-middle attacks

- Periodically asks the client for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Time-Based One-Time Password (TOTP)

A

Uses a time-based factor to create unique passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Usual minimum password length

A

8 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Generic Account

A

An account that is shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SLIP

A

One of the first remote authentication protocols, which should not be used now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PPP

A
  • No data security, but uses CHAP
  • Authentication handled by Link Control Protocol (LCP)
  • Encapsulates network traffic with Network Control Protocol (NCP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RADIUS server

A

Allows authentication of remote and other network connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TACACS+

A

Similar to RADIUS, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Security Assertion Markup Language (SAML)

A

Open standard based on XML used for authentication and authorization

22
Q

Lightweight Directory Access Protocol (LDAP)

A

Allows queries to be made of directories

23
Q

Key Distribution Center (KDC)

A
  • Authenticates a user, program, or system and provides it with a ticket used to show it has been authenticated.
  • Used in Kerberos
24
Q

Ticket Granting Ticket (TGT)

A

The ticket given by the KDC, listing the privileges of the user.

25
Mandatory Access Control (MAC)
- All access is predefined | - Considered most secure
26
Discretionary Access Control (DAC)
Incorporates some flexibility, allowing someone with certain permissions to allow someone without the permissions to see stuff
27
Role-Based Access Control (RBAC)
Implements access by job function or by responsibility.
28
Rule-Based Access Control (RBAC)
Use an ACL to deny all but those who appear in a list, or deny only those that appear in a list.
29
Access Review
A process to determine whether a user's access level is still appropriate.
30
Continuous Monitoring
Ongoing audits of what resources a user actually accesses
31
Thin Clients
Don't provide any disk storage or removable media, and rely on servers to use applications and data.
32
Common Access Card (CAC)
Issued by the DoD as a general identification/authentication card.
33
Personal Identity Verification Card (PIVC)
A card specific to that one person, used in high up government stuff.
34
3 Firewall Rules
1) Block the connection 2) Allow the connection 3) Allow the connection only if it is secured
35
802.1X
- Port-based security | - AKA EAP over LAN (EAPOL)
36
Loop Protection
Intended to prevent broadcast loops
37
Spanning Tree Protocol (STP)
Intended to ensure loop-free bridged Ethernet LANs
38
Network Bridging
- When a device has multiple NICs and the opportunity presents itself to jump between them. - We don't want it on common man's machines, so disable it!
39
Trusted Operating System (TOS)
Any OS that meets the government's requirements for security.
40
Common Criteria (CC)
Security evaluation criteria specified by the collaboration between a few countries.
41
Evaluation Assurance Level (EAL)
How the criteria is broken down in CC
42
EAL 1
Wants assurance that the system will operate correctly, but not very concerned with security
43
EAL 2
Requires product developers to use good design practices.
44
EAL 3
Requires conscientious development efforts to provide moderate levels of security
45
EAL 4
- Requires positive security engineering based on good commercial development practices. - The recommended level for commercial systems
46
EAL 5
Requires special design considerations for high levels of security
47
EAL 6
High levels of protection against significant risks
48
EAL 7
Extremely high levels of security requiring extensive testing
49
Type 7
Weak encryption password type used in routers
50
MD5
The stronger password type used in routers