CISSP Domain 5 Flashcards
Identity and Access Management
Identification methods and technologies
Authentication methods, methods, models, technologies
Accountability, monitoring, and auditing practices
Registration and proof of identity
Identity as a service
Threats to access control practices and technologies
Access is
the flow of information between a subject and an object
A subject is
an active entity that requests access to an object or data within an object
Availability
Information, systems, and resources must be available to users in a timely manner so productivity will not be affected
Integrity
Information must be accurate, complete, and protected from unauthorized modification
Confidentiality
assurance that information will not be disclosed to unauthorized individuals, programs, or processes
Identification
describes a method by which a subject claims and identity. Username, account number, email address
Authentication
Proof the subject is the one with the identity claimed
A second piece of a credential set
Authorization
The system determines the subject has permission to access the object
Accountability
The subject is identified, authenticated, authorized, and actions are recorded
Race Condition
When processes carry our tasks on a shared resource in an incorrect order.
when two or more processes use the same resource and the sequence of steps withing the software can be carried our in an improper order
Factors for Authentication
Something a person knows
Something a person has
something a person is
Knowledge
Ownership
Characteristic
Secure identities
uniqueness
Nondescript
issuance
User provisioning
creation,, maintenance, and deactivation of user objects and attributes
Biometric type one error
False Rejection Rate
FRR
Biometric type two error
False Acceptance Rate
Crossover Error Rate
also called equal error rate (EER)
Salts
random values added to the encryption process to add ore complexity and randomness
Cognitive passwords
fact or opinion based information used to verify an individuals identity
One Time Password
also called dynamic password
used only once
asynchronous and Asynchronous
Synchronous token
uses time or a counter
Asynchronous Token
employs a challenge response scheme
random value called a nonce
Memory Cards and Smart card difference
capacity to process information
Memory card holds information, but cannot process
Smart card holds information and can process
Smart Card types
contact and contactless
Contact has a seal or chip
Contactless has antenna wire
antenna generates power