Logical Security Flashcards
(79 cards)
What is Identity and Access Management (IAM)?
Security process for identification, authentication, and authorization of users, computers, and entities
IAM provides access to organizational assets like networks, operating systems, and applications.
Who are the unique subjects in IAM?
- Personnel
- Endpoints
- Servers
- Software
- Roles
Each subject plays a distinct role in the IAM process.
What are endpoints in IAM?
Devices (desktops, laptops, tablets, cell phones) used to access the network
Endpoints are crucial for user access to organizational resources.
Define roles in IAM.
Define permissions based on the function an asset fulfills, applicable to personnel, endpoints, servers, and software
In Windows, permissions are assigned to groups of users.
What is account creation and deprovisioning in IAM?
Provisioning new accounts and disabling/deleting existing accounts
This is a fundamental task in managing user access.
What does account auditing involve?
- Managing permissions
- Reviewing account activity to ensure legitimacy
Account auditing is essential for maintaining security and compliance.
What is the biggest risk in IAM?
The risk caused by accounts
User accounts, especially privileged and shared accounts, pose significant risks.
True or False: Privileged accounts have basic permissions.
False
Privileged accounts have elevated permissions and require additional auditing.
What is Multifactor Authentication (MFA)?
Authenticating or proving identity using more than one method
At least two methods are required for MFA.
List the categories of MFA.
- Something You Know
- Something You Have
- Something You Are
- Something You Do
- Somewhere You Are
Each category represents a different method of authentication.
What are the weaknesses of passwords?
- Unchanged default credentials
- Common passwords
- Weak or short passwords
These weaknesses make passwords vulnerable to attacks.
What is a dictionary attack?
Guessing the password using every word or phrase in a dictionary, including variations
This is a common method used by attackers to compromise accounts.
What is the benefit of using longer and more complex passwords?
Harder to crack
Password length and complexity are crucial for security.
Fill in the blank: A possession factor in MFA includes _______.
[Smart card, RSA key fob, RFID tag]
What is the purpose of geofencing?
Used to track devices and receive alerts if they enter or leave a predefined area
Geofencing is a method to ensure that devices are in an authorized location for authentication.
What is LDAP?
Centralized client/object database containing a hierarchical organization of the users, groups, servers, and systems in the network
LDAP is crucial for managing directory services.
What does Kerberos provide?
Windows domain authentication/authorization and mutual authentication
Kerberos issues tickets for authentication and ticket granting.
What is Single Sign-On (SSO)?
Single login for multiple resources
SSO simplifies access but can pose security risks if credentials are compromised.
What is SAML used for?
XML-based authentication data exchange
SAML is often used for SSO or federated identity management.
What is RADIUS?
Centralized administration for authentication
RADIUS is commonly used for dial-up, VPN, and wireless authentication.
USES UDP
What does IPSec provide?
Authentication and encryption of data packets to create a secure communication path
IPSec is widely used for VPNs.
What is the benefit of Time-Based Authentication?
Enhances security, resistant to replay attacks
TOTP is a common implementation of time-based authentication.
Define the Least Privilege principle.
Users should use the lowest level of permissions necessary to complete job functions
This principle applies to user accounts, system designs, and network configurations.
What is Discretionary Access Control (DAC)?
Access control method where owners of resources determine access permissions
DAC allows owners to assign permissions to files or folders they create.