Identity & Access Management Flashcards

(40 cards)

1
Q

EAP

A

Extensible Authentication Protocol
Integrates with 802.1X
Framework commonly used for wireless networks ; EAP-TLS, LEAP , EAP-TTLS, PEAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CHAP

A

Challenge Handshake Authentication Protocol.

Uses an encrypted challenge and three-way handshake to send credentials
-Challenge message
-Password hash from challenge and password
-Server compares hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.1X

A

IEEE standard for network access control (port based NAC)
RADIUS, LDAP, TACACS+
Supplicant - the client
Authenticator- go between provides access
Server - validates credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RADIUS?

A

Remote Authentication Dial-in User Service
Operates via TCP or UDP
sends passwords that are obfuscated by a shared secret and MD5 hash.
Typically encrypted using IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TACACS+

A

Terminal Access Controller Access Control System

Cisco designed, uses TCP for AAA providing full packet encryption and granular command controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kerberos

A

Favoured by Microsoft: Operates on untrusted networks and uses authentication to shield its traffic.
The primary - username
The instance - to differentiate similar primaries
The realm - groups of users separated by trust boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TGT

A

Ticket Granting Ticket

When I client wants to use Kerberos to access a service they request this; (authentication ticket)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TGS

A

Ticket Granting Service (Kerberos)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

KDC

A

Kerberos Distribution Centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SAML

A

Security Assertion Markup Language

XML based open standard for exchanging AA information between identity and service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP

A

Lightweight Directory Access Protocol

Deployed as part of an identity management infrastructure database to offer hierarchically organised directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MFA

A

Multi Factor Authentication

-something you know
-something you have
-something you are
- somewhere you are
- something you can do
- something you exhibit
- someone you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TOTP

A

Time-based One Time Passwords

Use algorithm to drive a password using current time as part of the process, and is valid for set period
eg Google Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HMAC

A

Hash Based Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HOTP

A

HMAC based One Time Password
(Hash Based Authentication Code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FAR

A

False Acceptance Rate

18
Q

ROC

A

Relative Operating Characteristics (biometrics) compares the FAR and FRR of a system typically as a graph

19
Q

COR

A

Cross Over Error Rate (biometrics)
Where FRR and FAR intersect
Lower is better

20
Q

KBA

A

Knowledge Based Authentication

I.e. security questions

21
Q

TPM

A

Trusted Platform Module
Cryptoprocessor Modules or chips help prevent unauthorised changes to firmware or software as part of secure boot

22
Q

HSM

A

Hardware Security Module

Create, store, manage crypto keys

23
Q

ABAC

A

Attribute Based Access Control

For setups requiring more complex options than RBAC

24
Q

RBAC

A

Role Based Access Control

25
R(u)BAC
Rule Based Access Control
26
MAC (security not hardware)
Mandatory Access Control
27
DAC
Discretionary Access Control I.e self managing file permissions
28
OAuth
Protocol to allow users to grant 3rd party access without providing password, typically used by OpenID providers I.e Login with Google is an OpenID provider
29
PAM
Privileged Access Management Tools focus on principles of ‘least privilege’
30
SIEM
Security Information Event Management Software provides real time analysis of security alerts generated by apps and (network) hardware
31
X.509
International standard governing digital certificates
32
WPA2
CCMP (Counter mode with Cipher block chaining Message authentication code Protocol /CNC-MAC) DATA protected with AES Message integrity Check (MIC) CBC-MAC
33
WPA3
Uses different block cipher mode: GCMP (Galois/Counter Mode Protocol) Data integrity with AES MIC with GMAC
34
WPA2 PSK problem
Can listen to 4 way handshake | capture hash and then brute force
35
SAE
Simultaneous Authentication of Equals In WPA3 gives mutual authentication with 4 way (dragonfly) handshake which gives shared key without sending across the network
36
EAP-FAST
EAP Flexible Authentication Secure Tunnel Server and supplicant share PAC Supplicant and AS negotiate TLS Tunnel Needs RADIUS
37
PEAP
Protected EAP CISCO, MS & RSA Also encapsulate ms in TLS Server uses a certificate instead of PAC (protected access credential/secret) Combined with CHAP with MS
38
EAP-TLS
Requires digital certificates in all devices with an exchange so need PKI
39
EAP-TTLS
EAP-TunneledTLS Only a certificate on the AS to build a tunnel and uses any authentication method in the tunnel
40
Linux File Permissions 0-7
0 - - - 1 - - x 2 -w- 3 -wx 4 r- - 5 r-x 6 rw- 7 rwx