Identity And Access Management Flashcards

1
Q

List the 3 key concepts

A
  1. Authentication
  2. Authorization
  3. Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Authentication

A

validating who a user claims to be
- something you are
- something you have
- something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Authorization

A

Giving someone permission to do or access something
- give user access to resource
- happens after authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Accounting

A

process of measuring the resource and the consumption
- time logged in
- data they access/changed
- make sure access is as intended
- verify access only to correct accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some methods of authentication?

A

biometrics
built in on many devices
token (card, message)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Identity Governance

A

process for managing access to resources via a centralized solution
- check user’s token
- provides access to right resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Identity Provider

A

services that confirms identity
- trusted source that can create, store, and manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of Identity Provider

A
  • Azure Active Directory Accounts
  • Microsoft Accounts
  • Google
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Single Sign-On

A

used to gain access to multiple services via one sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the User benefits of SSO

A
  • cross site navigation
  • increased productivity
  • reduce password fatigue
  • more secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Admin benefits of SSO

A
  • standard process across resources
  • improved new security
  • a single ID across multiple systems
    • granting and deleting users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is token forwarding

A

the token follows you across systems
- not all systems allow this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List some SSO Providers (6)

A
  1. Okta Identity Cloud
  2. OneLogin Unified Access Management Platform
  3. JumpCloud Directory as a Service
  4. Ping Intelligent Identity Platform
  5. Idaptive
  6. Microsoft Azure Active Directory (AD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Access Control Attacks

A

intruders will try to defeat, bypass, or trick access controls in order to reach their target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List 5 Attack Objectives

A
  1. Guess credentials
  2. Malfunction of access controls
  3. Bypass access controls
  4. Replay known good logins
  5. Trick people into giving up credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Script Injection

A

Insertion of scripting language characters into application input fields

17
Q

Define Data Remanence

A

data that remains after it has been deleted

18
Q

List 4 examples of Data Remanence

A
  1. Deleted hard drive files
  2. Erased files
  3. Reformatted hard drive
  4. Discarded / lost media; USB, backup tapes, CDs
19
Q

What is the countermeasure for data remanence

A

improve media physical controls

20
Q

Define Denial of Service (DoS)

A

actions that cause target system to fail thereby denying service to legitimate users
- specifically crafted input that causes application malfunction
- large volume of input that floods application

21
Q

define Distributed DoS (DDoS)

A

large volume of input from many of sources

22
Q

what is the countermeasure for DoS

A

input filters, patches, high capacity

23
Q

define dumpster diving

A

literally going through company trash in the hopes that sensitive printed documents were discarded that can be retrieved

24
Q

what is the countermeasure for dumpster diving

A

on-site shredding

25
define eavesdropping
interception of data transmissions - network sniffing - wireless network sniffing
26
what are the countermeasures for dumpster diving
encryption, stronger encryption
27
define enamation
electromagnetic radiation that eliminates from computer equipment - network cabling - crt monitors - wifi networks
28
what are the countermeasures of emanation
shielding, twisted pair network cable, LCD monitors, lower power or eliminate wifi
29
what are the countermeasures for social engineering and phishing
security awareness training
30
define password cracking
obtain / retrieve hashed passwords from target
31
what is the countermeasure to password cracking?
frequent password changes, controls on hashed password files