Domain 5 -- Identity and Access Management Flashcards
(101 cards)
What is a subject?
- A subject is an active entity that requests access to an object or the data within an object
- Can be user, program or process that accesses an object to accomplish a task
What is an object?
- An object is a passive entity that contains information or needed functionality
- Can be a computer, database, file, computer program, directory or field contained in a table in a tableBASE
What is Identification?
Identification describes a method by which a subject (user, program or process) claims to have a specific identity (user name, account number or email address)
What is authentication?
Authentication is the process by which a system verifies the identity of the subject, usually by requireing a piece of information that only the claimed identity should havew
A user identification and authentication information together combine to create ________________.
credentials
What is meant by a race condition with respect to Identity and Access Management?
If authentication and authorization are split into 2 functions, it’s possible that the authorization will occur before the user is authenticated.
What are three somethings for authentication?
- Type 1 Something a person knows
- Type 2 Something a person has
- Type 3 Something a person is
Creating or issuing secure identitites should include which 3 aspects?
- Uniqueness
- must uniquely identify a person
- Non-descriptive
- Don’t use ID’s like Administrator or backup_operator
- Issuance
- Provided by another authority
- Example is an ID card
- Provided by another authority
it is important to authenticate not only users, but also __________.
systems
What are 4 Identification Component Requirements?
- Each value should be unique
- A standard naming scheme should be followed
- The value should be nondescriptive of the user’s position or tasks
- The value should not be shared between users
What are the 3 things that MAC can stand for in the CISSP exam?
- Media Access Control (MAC Address)
- Mandatory Access Control
- Message Authentication Code
What are the rules for a database directory based on the X.500 standard?
- The directory has a tree structure to organize entries using parent-child configuration
- Each entry has a unique name made up of attributes of a specific object
- The attributes used in the directory are dictated by the defined schema
- The unique identifiers are called distinguished names
Are cookies always stored on disk?
No.
Some cookies are permanent and remain on the user’s hard disk
Other cookies – such as cookies issued by a bank to allow a user to perform online banking should only be held in memory
Web Access Management Products are typically used for ___________ users and Credential Management products are typically used for __________ users
external
internal
What’s the difference between password synchronization and SSO
- With password synchronization, the tool takes the user’s password and then updates all the applications he uses with this password. The user must still log in separately to each application
- SSO means that the SSO software intercepts the user ID/password dialog and fills it in for the user. The user only needs to log in once.
What are the downsides of SSO?
- It’s expensive
- It can take a long time to implement
- All user credentials are stored in one place. If an attacker broke in, then they would have everything.
What are the two categories of biomentrics?
- Physiological - what you are
- fingerprints
- retina scans
- Behavioral - what you do
- signature dynamics
What is the Crossover Error Rate (CER) as it relates to biometric authentication systems
It’s the point at which the percentage of false positives and false negatives are equal.
What are some of the biometrics that can be used to identify a user?
- Fingerprint
- Palm scan
- Hand geometry
- Retina scan
- Iris scan
- Signature dynamics
- Keystroke dynamics
- voice print
- facial scan
- Hand topogragy
What are six ways an attacker can try to steal passwords?
- electronic monitoring
- access password file
- brute force attacks
- dictionary attacks
- social engineering
- rainbow table
What are some of the common methods of authentication via “something you know?”
- PIN
- Password
- Passphrase
- Cognitive password (favorite color)
- personal history info
- CAPTCHA
What’s the key difference between synchronous and asynchronous token devices?
Synchronous tokens depend on using time or a counter as a core piece of the authentication process
Asynchronous tokens depend on a nonce – a random value sent by the authentication server. User enters the nonce into the token device, which encrypts it and gives the user a OTP, which the users sends to the auth server along with userid/pw.
If the auth server can decrypt the value and it matches what was sent earlier, the user is authenticated.
What are some of the cryptographic methods that are used in authenticating a user?
- Digital Signature (private key that is used to encrypt a hash value)
- Passphrase -StickWithMeKidAndYouWillWearDiamonds
- application converst passphrase into a virtual passphrase that might be 128 bytes long.
- The virtual password is what is actually used for authentication on the wire
What’s the difference between a memory card and a smart card?
- A memory card can only hold information, but not process information
- A smart card can both hold and process information
