Identity & Access Management Flashcards

1
Q

EAP

A

Extensible Authentication Protocol
Integrates with 802.1X
Framework commonly used for wireless networks ; EAP-TLS, LEAP , EAP-TTLS, PEAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CHAP

A

Challenge Handshake Authentication Protocol.

Uses an encrypted challenge and three-way handshake to send credentials
-Challenge message
-Password hash from challenge and password
-Server compares hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.1X

A

IEEE standard for network access control (port based NAC)
RADIUS, LDAP, TACACS+
Supplicant - the client
Authenticator- go between provides access
Server - validates credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RADIUS?

A

Remote Authentication Dial-in User Service
Operates via TCP or UDP
sends passwords that are obfuscated by a shared secret and MD5 hash.
Typically encrypted using IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TACACS+

A

Terminal Access Controller Access Control System

Cisco designed, uses TCP for AAA providing full packet encryption and granular command controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kerberos

A

Favoured by Microsoft: Operates on untrusted networks and uses authentication to shield its traffic.
The primary - username
The instance - to differentiate similar primaries
The realm - groups of users separated by trust boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TGT

A

Ticket Granting Ticket

When I client wants to use Kerberos to access a service they request this; (authentication ticket)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TGS

A

Ticket Granting Service (Kerberos)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

KDC

A

Kerberos Distribution Centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SAML

A

Security Assertion Markup Language

XML based open standard for exchanging AA information between identity and service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP

A

Lightweight Directory Access Protocol

Deployed as part of an identity management infrastructure database to offer hierarchically organised directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MFA

A

Multi Factor Authentication

-something you know
-something you have
-something you are
- somewhere you are
- something you can do
- something you exhibit
- someone you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TOTP

A

Time-based One Time Passwords

Use algorithm to drive a password using current time as part of the process, and is valid for set period
eg Google Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HMAC

A

Hash Based Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HOTP

A

HMAC based One Time Password
(Hash Based Authentication Code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FAR

A

False Acceptance Rate

18
Q

ROC

A

Relative Operating Characteristics (biometrics) compares the FAR and FRR of a system typically as a graph

19
Q

COR

A

Cross Over Error Rate (biometrics)
Where FRR and FAR intersect
Lower is better

20
Q

KBA

A

Knowledge Based Authentication

I.e. security questions

21
Q

TPM

A

Trusted Platform Module
Cryptoprocessor Modules or chips help prevent unauthorised changes to firmware or software as part of secure boot

22
Q

HSM

A

Hardware Security Module

Create, store, manage crypto keys

23
Q

ABAC

A

Attribute Based Access Control

For setups requiring more complex options than RBAC

24
Q

RBAC

A

Role Based Access Control

25
Q

R(u)BAC

A

Rule Based Access Control

26
Q

MAC (security not hardware)

A

Mandatory Access Control

27
Q

DAC

A

Discretionary Access Control

I.e self managing file permissions

28
Q

OAuth

A

Protocol to allow users to grant 3rd party access without providing password, typically used by OpenID providers
I.e Login with Google is an OpenID provider

29
Q

PAM

A

Privileged Access Management

Tools focus on principles of ‘least privilege’

30
Q

SIEM

A

Security Information Event Management

Software provides real time analysis of security alerts generated by apps and (network) hardware

31
Q

X.509

A

International standard governing digital certificates

32
Q

WPA2

A

CCMP (Counter mode with Cipher block chaining Message authentication code Protocol /CNC-MAC)
DATA protected with AES
Message integrity Check (MIC) CBC-MAC

33
Q

WPA3

A

Uses different block cipher mode: GCMP (Galois/Counter Mode Protocol)

Data integrity with AES
MIC with GMAC

34
Q

WPA2 PSK problem

A

Can listen to 4 way handshake | capture hash and then brute force

35
Q

SAE

A

Simultaneous Authentication of Equals
In WPA3 gives mutual authentication with 4 way (dragonfly) handshake which gives shared key without sending across the network

36
Q

EAP-FAST

A

EAP Flexible Authentication Secure Tunnel
Server and supplicant share PAC
Supplicant and AS negotiate TLS Tunnel
Needs RADIUS

37
Q

PEAP

A

Protected EAP
CISCO, MS & RSA
Also encapsulate ms in TLS
Server uses a certificate instead of PAC (protected access credential/secret)

Combined with CHAP with MS

38
Q

EAP-TLS

A

Requires digital certificates in all devices with an exchange so need PKI

39
Q

EAP-TTLS

A

EAP-TunneledTLS
Only a certificate on the AS to build a tunnel and uses any authentication method in the tunnel

40
Q

Linux File Permissions 0-7

A

0 - - -
1 - - x
2 -w-
3 -wx
4 r- -
5 r-x
6 rw-
7 rwx