GCGA Ch.2 Understanding Identity and Access Management Flashcards

(35 cards)

1
Q

Authentication

A

proves an identity with some type of credentials, such as a username and password. Identification occurs when someone makes a claim about their identity w/ unique identifiers (username/email). Users prove it with a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorization

A

provides access to resources based on proven identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accounting

A

tracks user activity, records it in logs. Allows security admins to create an audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Audit trail

A

allows security professionals to re-create the events that preceded a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication methods

A

something you know (password, PIN), something you have (smart card, phone, USB token), something you are (biometrics), somewhere you are (home, office) - are, place, have, know (APHK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

KBA

A

Knowledge-Based Authentication - method of authenticating individuals based on what they know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Static KBA

A

you answer questions about yourself, such as dog’s name or mother’s maiden name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dynamic KBA

A

queries public/private data sources like credit reports, vehicle registrations, property records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HOTP & TOTP

A

HMAC-based one-time password & time-based one-time password - open-source standards used to generate one-time-use passwords; HOTP passwords do not expire until used; TOTP generates one-time passwords that expire after a specified period of time (typically 30-60s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FAR

A

False acceptance rate - identifies % of times false acceptance occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FRR

A

False rejection rate - identifies % of times false rejections occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CER

A

Crossover error rate - indicates biometric system’s quality. Lower CER is better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Best practices for accounts

A

don’t share accounts/passwords, most orgs make sure Guest acct disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PAM

A

Privileged access management - implements stringent security controls over accounts with elevated privileges, such as administrator or root accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Account disablement policy

A

ensures that inactive accounts are disabled (for employees who resign/are terminated).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Account audit

A

looks at rights & permissions assigned to users; enforces least privilege principle

17
Q

SAML

A

Security Assertion Markup Language - XML-based standard used to exchange authentication/authorization info between parties

18
Q

OAuth

A

open standard for authorization; allows users to log on with another account, i.e. Google, Facebook, PayPal, Microsoft, etc.; uses API calls to exchange info and a token to show access is authorized.

19
Q

Role-BAC

A

role-based access control - uses roles to grant access by placing users into roles based on their assigned jobs, functions, or tasks.

20
Q

Group-based privileges

A

a form of role-BAC. Administrators create groups, add users to the groups, and then assign permissions to the groups.

21
Q

Rule-BAC

A

rule-based access control - based on a set of approved instructions, such as ACL rules in a firewall. Some rule-BAC implementations use rules that trigger in response to an event, such as modifying ACLs after detecting an attack.

22
Q

DAC

A

Discretionary access control - every object has an owner. The owner has explicit access and establishes access for any other user. Microsoft NTFS uses the DAC scheme, with every object having a discretionary access control list (DACL). The DACL identifies who has access and what access they are granted.

23
Q

MAC

A

Mandatory access control - uses security or sensitivity labels to identify objects (what you’ll secure) and subjects (users). It is often used when access needs to be restricted based on a need to know. The administrator establishes access based on predefined security labels. These labels are often defined with a lattice to specify the upper and lower security boundaries.

24
Q

ABAC

A

Attribute-based access control - evaluates attributes and grants access based on these attributes’ values. It is used in many software-defined networks (SDNs).

25
Four factors of authentication
Something you know, such as a username and password Something you have, such as a smart card or token Something you are, using biometrics, such as fingerprints, vein scans, facial scans, and gait analysis Somewhere you are, such as your home or office
26
password managers
store and simplify the use of credentials for users. When users access websites needing credentials, the system automatically retrieves the stored credentials and submits them to the website.
27
push notifications & 2FA
Push notifications are often used for 2FA. Users find them user-friendly and non-disruptive because they can verify their authentication by pressing a screen button.
28
Account lockout policies
lock out an account after a user enters an incorrect password too many times. This helps prevent brute force and dictionary attacks.
29
Default passwords
should be changed on any applications or devices before putting them into service.
30
Single-Factor Authentication, Dual-Factor Authentication, and Multifactor authentication
includes one or more authentication methods that use the same factor, such as a PIN and a password (both something you know). Dual factor (or two-factor) authentication uses two factors of authentication, such as a token key (something you have) and a PIN (something you know). Multifactor authentication uses two or more factors and is stronger than any form of single-factor authentication.
31
shared accounts
Users should not share accounts, and most organizations ensure the Guest account is disabled. Shared accounts prevent effective identification, authentication, authorization, and accounting.
32
Admin account policies
Account policies often require administrators to have two accounts (an administrator account and a standard user account) to prevent privilege escalation and other attacks.
33
Time-based logins (or time-based restrictions)
prevent users from logging on or accessing network resources during specific hours. Location-based policies prevent users from logging on from certain locations.
34
SSO
Single sign-on (SSO) allows users to authenticate with a single user account and access multiple resources on a network without authenticating again.
35
SSO & federated identity
SSO can be used to provide central authentication on the Internet with a federated database. A federated identity links a user’s credentials from different networks or operating systems, but the federation treats it as one identity.