S16-Logical Security Flashcards
Identity and Access Management (IAM)
Identification, Authentication and authorization mechanisms for users and computers
What are IAM endpoints?
- Desktops
- Laptops
- Tablets
- Cellphones
- etc.
Roles
Identifying an asset by defining the resource an asset has permission to access based on the function the asses fulfills
What things can roles be assigned too?
- Servers
- People
- Endpoints
What are some IAM tasks?
- Directory Services and repositories
- Access management tools
- Auditing and reporting systems
Goals and Functions of iAM
- Create and deprovision accounts
- Manage accounts
- Audit accounts
- Evaluate identity-based threats
- Maintain compliance
Multifactor Authentication
Authenticates or proves an identity using more then 1 method
what are the different forms of authentication?
- Something you know
- Somethin you have
- something you are
- something you do
- something you are
Something you know
Knowledge factor
- Eg. password, username
Something you have
Possession Factor
- Eg. smartcards, RSA key fobs, RFID tags
something you are
Inherence Factor
- Eg. Fingerprints, retina scans, voice prints
something you do
Action Factor
- Eg. How you sign your name
- how you draw a pattern
- how you say a catch phrase
somewhere you are
Location Factor
- Geotagging
- Geofencing
Dictionary attack
Guesses the password by attempting to check every single word or phrase contained within a word list, called a dictionary
Brute Force attack
Tries every possible combo until the password is cracked
Hybrid Attack
Combination of dictionary and brut force attacks
Authentication
The process of determining whether someone or something is who or what it claims itself to be
Lightweight Directory Access Protocol (LDAP)
A database that is used to centralize information about the clients and the objects on the network
what port does LDAP use?
Port 389 (Plain texts version)
Port 636 (Secure)
Active Directory (AD)
Organizes and manages everything on the network, including clients, servers, devices, and users
Kerberos
Focused on authentication and authorization within a windows domain environment
- Uses a ticketing system on your domain controller
What port does Kerberos use?
Port 88
Single Sign-On (SSO)
Authentication method where users can have a single strong password or utilize multi-factor authentication
Security Assertion Markup Language (SAML)
simplifies the authentication process for users and enables SSO by allowing the IdP to manage user identities and credentials, and the SP to verify those credentials and grant access.