Domain 5 - Identity and Access Management Flashcards
(98 cards)
Crossover Error rate
point where false reject rate and false accept rate equal
Represents the overall accuracy of system.
False accept rate
occurs when unauth subject is accepted by a biometric system as valid. AKA Type 2 error
False reject rate
when an authorized subject is falseley rejected. Type 1 error
Type 1 authentication
something you know
password
type 2 auth
something you have (key, keycard)
Type 3
something you are (biometric)
Credential set
term used for combination of identification and authentication.
Passphrase
long password in the form of a sentance. Usually less random.
One time passwords
used for single auth. Very secure but difficult to manage.
NIST 800-63B guideline
guidelines for password complexity
Dynamic Passwords
change at regular intervals. RSA Security makes a synchronous token every 60 seconds.
Expensive
Strong authentication
AKA Multifactor authentication
Password hashes and pass cracking
password is run through a hash and the hash is stored in DB
Linux password hashes
stored in etc/shadow. Only readable by root
Windows password hash
stored locally and on domain controller in SAM File/security management file.
Dictionary attack
run large list of words through hash algs to try and find collision.
Brute force attack
Go through the entire key space. All combos
Hybrid attack
appends, prepends, or changes characters in words from a dictionary before hashing. Attempts fastest crack of complex passwords.
Rainbow table
large dictionary of HASHED passwords. Trandes off lower CPU resources required, for more storage required.
Salts
random value added to pre-hash value. Ensures the same password doesn’t have the same hash twice.
Password MGMT: Pasword history
remember the last 24 passwords
Password MGMT: Max password age
90
Password MGMT: Min password age
2 days
Password MGMT: Min password length
8 char