Identity and Access Management Flashcards

(57 cards)

1
Q

Access Provision Lifecycle

A

only setup account for those who require them
review account data for error/inconsistencies
audit access authorization/failures
remove access when necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identification

A

Positive/Negative Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Requires a key piece of information that only the users knows - aka password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

tied closely to principle of least privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Authentication

A

Know, Have, Are, Somplace(GPS/Geo Location)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Passphrases

A

compared to strong password - less entropy per character but more over entropy due to length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password guessing

A

guessing password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Password cracking

A

determine cleartext password based on stole password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dictionary attack

A

word list, hash to see if matches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hybrid

A

begin with word list and adds/changes characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Brute force

A

attempts every possible password

All combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rainbow tables

A

calculate hash for every password

Salt makes rainbow ineffective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Salt

A

random number that is hashed along with the salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tokens

A

Counter Based - asynchronous dynamic password token

Time-Based - Synchronous dynamic password token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Synchronous dynamic password token

A

same time (RSA token)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asynchronous dynamic password token

A

Password available, no time limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Biometrics Identifiers

A
Fingerprints
Palm scan
Hand geometry
Voice print
Retina pattern
Iris scan
Facial recognition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

False Reject Rate (FRR)

A

Type I Error

It’s me but rejects me

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

False Accept Rate (FAR)

A

Type II Error
It’s not me but accepts it - intruder
Remember Type II is worst than Type I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Crossover Error Rate (CER)

A

Point where False Reject Rate and False Accept Rate are equal
Equal Error Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Enrollment (Biometrics)

A

Needs to enroll in 2 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Throughput (Biometrics)

A

10 subjects/min - once ever 6 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Key Distribution Center (KDC)

A

Vuln - contains all users password in plaintext
access to all keys
issues TGT

24
Q

Kerberos

A

symmetric encryption

***Mutual authentication is best part about it

25
SESAME
European equivalent to Kerberos
26
Directory Services
TCP: 389 | LDAP
27
Screensaves & timeout
Screensavers - 5 minutes | Automatic logoff after 10 minutes
28
Federated Identity Management
users across different organization can authenticated
29
Security Asssertions Markup Language (SAML)
standard-based means of allowing for communication of identity and authentication information.
30
Service Provider (SP) (SAML)
application that can lever identity/auth assertion | Think of an application that is used google gmail to authenticate
31
Identity Provider (IdP) (SAML)
This would be google gmail authenticator
32
Assertions Consumer Services
host by the Service Provider and is the IdP sends the assertions
33
Identity Provider (IDP) (OpenID)
sites that the sources of identify information
34
Replaying Parties (RP) (OpenID)
sites that can use identity information from IdP
35
RedirectURL (OpenID)
redirect URL information RP that the subject has been successfully authenticated
36
RedirectURL (OpenID)
redirect URL information RP that the subject has been successfully authenticated
37
Identity As A Service (IDaaS)
Single Sign-On for cloud | Dual Factor authentication and encryption critical components
38
Subject: Active
user, process, device | Active entity
39
Subject: Passive
files, directories, pipes | passive entity that contains or receives information
40
Rules
Filters
41
Labels
Sensitivity
42
Mandatory Access Control Strengths
Controlled by systems, can't be overridden | strict control/cannot share
43
Mandatory Access Control (MAC) Weakness
``` Protects information in digital form Assumes: trust users/admin levels have been applies by individual User do not share account or access Proper physical security in place ```
44
Discretionary Access Control (DAC)
``` owner can change security attributes - think Windows file that can be changed by user tabular listing (think how unix displays files across with the permission listed ```
45
Discretionary Access Control (DAC) Strengths
fast and can modify their own files
46
Discretionary Access Control (DAC) Weakness
intentionally/unintentionally grant access when they shouldn't Simple error cause unauthorized disclosure DAC depends on users acting in trustworthy manner
47
Non-Discretionary Access Control
``` central authority determines which object a subject can access Rule-based: Firewall Role-Based: Task-Based: focus on task vs roles Attribute-Based: ```
48
Non-RBAC Role-Based Access Control (RBAC)
user granted access via Access Control List
49
Limited RBAC Role-Based Access Control (RBAC)
users mapped to applications | Local system account
50
Hybrid RBAC Role-Based Access Control (RBAC)
users assigned roles that is assigned access to systems
51
Full RBAC Role-Based Access Control (RBAC)
access is controlled by roles and applied to applications and systems. think Active Directory
52
Attribute-Based Access Control (ABAC)
access decisions based on subject/object attributes, environmental conditions Complex - e.g. based on time, where you logged in from, etc..
53
Content Dependent
access based on data content | Think of browsing the web at work
54
Context Dependent
Account locked out after x number of attempts | think of incrementing counter
55
Captcha
mechanism for enforcing a context-dependent access control
56
Constrained User Interface
Limited menu options within an application
57
Temporal (Time-Based) Isolation
during week accept time cards, then blocks, before opening again.