Part-2 Acronyms Flashcards

1
Q

IAM

A

Identity and access management

Security process that provides identity, the authentication and authorization mechanisms for users, computers and other entities to work with organizational assets like net works, operating systems and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC

A

Mandatory access control

Subjects are assigned a security level or Clarence when they try to access an object their, clearance level must correspond to the object security level. If there is a match, the subject can access the objects; if there is no match, the subject is denied access. Mac security labels can generally be changed to only by system administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DAC

A

Discretionary access control

When you were trying to access the file that is protected, all you need to do is Austin minute straighter to grant you access and then you can start using the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access control list

List of subjects who are allowed access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RBAC

A

Role-based access control

Subjects are assigned to pre-defined roles, and network objects are configured to allow access only to specific roles. Access control based on the subjects assigned. An administrator assigns to a role only those privileges subjects in the role need to complete their work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rulebased access control

A

This is an access control technique that is based on a set of operational rules or restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ABAC

Attribute base access control

A

If x, then y
If a subject has both the type = database and department = customer service attributes then they are granted access to the computer database.
Since you, as a general administrator, do not possess these attributes, you’re denied access. Attributes are created ahead of time and must aptly Describe the important factors that distinguish one subject from another. Administrators can I sign these attributes during identity creation, or they can be assigned dynamically, depending on what the attributes are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical access control devices

A

These are common in IAM architectures where organizations cannot rely solely on software based authentication and authorization solutions.

Example smart cards

Smart Cards are used as a “something you have “ for user to gain physical injury to location; to gain access to computer system or to initiate the transfer transaction with another entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Biometric devices

A
Fingerprint scanners
Voice recognition devices
Retinal scanners
Iris scanners
Facial recognition devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Biometric factors

A

FAR false acceptance rate
FRR false rejection rate
CER Crossover error rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Certificate based authentication

A

A technique used in a “something you have“authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAC

A

Common access card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Directory service

A

A network service that stores identity information about all the objects in a particular network, including users, groups, servers, clients, printers, and network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LDAP

A

Lightweight directory access protocol

LDAP clients Authenticate to the LDAP service, and the service schema defines The tasks that clients can and cannot perform while accessing a directory database, the form the directory query must take, and how the directory server will respond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Schema

A

The structure of the directory is controlled by a blank blank blank that defines rules for how objects are created and what their characters can be most blanks are extensible, so they can be modified to support the specific needs of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active directory

A

This allows administrators to centrally manage and control access to resources using axis control us or ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tunneling

A

This is a data transport technique that can be used to provide remote access in which a data package is encrypted and encapsulated in another day to pack it in order to conceal the information of the packet inside.

Typically employed as a security measure in VPN connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Remote access protocols

A

Point to point protocol (PPP)
Point to point tunneling protocol (PPTP)
Layer two tunneling protocol L2TP
Secure socket tunneling protocol SSTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Point to point protocol

PPP

A

This is a legacy Internet standard for sending IP datagram packets over serial point to point links. It can be used in synchronous and asynchronous connections.

20
Q

Point to point tunneling protocol

A

This is a Microsoft VPN layer 2 protocol that increases the security of PPP by providing tunneling and data encryption for PPP packets.

PPTP is no longer recommend by Microsoft.

21
Q

Layer 2 Tunneling protocol

A

L2TP

L2 TP employees IP security transport mode for authentication

22
Q

Secure socket tunneling protocol

A

SSTP

This protocol uses SSL/TLS and encapsulates an IP packet with a PPP header and then with an SSTP header.

23
Q

HOTP

A

HM AC based one time password

An algorithm that generates one time passwords OTP using a hash based authentication code HM AC to ensure the authenticity of a message

24
Q

Time based OTP

A

TimedHM AC best one time password TOTP improves upon the HOTP algorithm by introducing a time based factor to the one time password Authentication.

25
Q

PAP

A

Password authentication protocol

It is a protocol that sends user IDs and passwords as plain text

26
Q

MD5

A

Message digest 5

27
Q

CHAP handshake process

A

Step one the remote client request a connection to the RAS
Step two the remote server sends a challenge sequence, which is usually a random value
Step three Remote client uses its password as an encryption key to encrypt the challenge sequence and sends a modified sequence to the server.
Step four The server encrypts the original challenge sequence with The password stored and it’s local credentials list and compare the results with the modified sequence received from the client:
If the two sequences do not match, the server closes the connection.
If the two sequences match, the server allows the client to access resources.

28
Q

NTLM

A

NT LAN Manager is a challenge response authentication protocol created by Microsoft

Weaknesses include outdated encryption algorithms, which are susceptible to brute force cracking attempts.

29
Q

AAA

A

Authentication, authorization and accounting
Security concepts and which is centralized platform verifies object identification, and choose the object is assigned relevant commissions, and then logs these actions to create an audit trail..

30
Q

Diameter

A

This is an authentication protocol that improves upon RADIUS By strengthening some of its weaknesses

31
Q

NPS

A

Network policy server

Is a window server implementation of a radius server it helps and administrating VPNs and wireless network

32
Q

TACACS & TACACS plus

A

Terminal access controller access Control system

Protocols provide AAA services for remote users.
TACAS plus includes process wide encryption for I think Acacian, from authorization packets, where as radius combines these functions in the same packet.

TACAS plus also supports multi factor authentication.

33
Q

Kerbos

A

And authentication service that is based on a time sensitive ticket granting system. It’s use for a single sign-on process.

This is used with active directory to authenticate users and computers any domain. This also employees mutual authentication to the both the client and server can verify each other’s identity. It also uses modern encryption standards like AES.

34
Q

Kerbos Process

A

Number one. User logs onto the domain
Number two to the user request a ticket granting ticket TGT from the offense kidding service
Number three. But authenticating server response with a timestamp TGT
Number four. The user presents the TGT back to the authenticating server and requests a service Ticket to access a specific resource.
Number five. The authenticating server responds with a service ticket.
Number six. The user presents the service ticket to the resource they wish to access.
Number seven. The resource authenticates and allows access.

35
Q

Account management

A

A common term used to refer to the processes, functions, and policies used to effectively manage user accounts within an organization

36
Q

Account types

A

User account
Privileged account
Guest account
Computer and service account

37
Q

Account policy

A

A document that includes and organizations requirements for account creation,account monitoring, and account removal.

38
Q

Security control (account management)

A
Standard naming conventions
On boarding and off boarding
Access recertification 
Usage auditing
Group based acces control
Location based policies
Time of day restrictions
39
Q

Credential managers

A

This was created to help users and organizations to more easily store and organize user names and password da.

Defend against keystroke-logging malware

40
Q

Credential management software

A

LastPass
KeePads
Apples Keychain

41
Q

Identity federation

A

This is the practice of linking a single identity across multiple disparate identity systems.

Google account

42
Q

Transitive Trust

A

A user account that is trusted by one system may be implicitly trusted by another system of those systems trust each other.

43
Q

Identity federation methods

A

SAML
OPENid
OAuth
Shinboleth

44
Q

SAML

A

Security assertion markup language

45
Q

OPENID

A

A method for authenticating users.

Google and amazon uses their own.

46
Q

OAuth

A

An authorization protocol that can be used to complement OPenID

47
Q

Shinboleth

A

Based on SAML

Federated identity method