Shared Flashcard Set

Details

D - SES-602 - Module 4 - Identity and Access Management
N/A
14
Computer Networking
Graduate
11/26/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
Digital Identity (definition)
Definition
A unique string used for tracking access to systems.
Term
Tempory ID
Definition

Assignments of department responsibilities to temporary workers.

 

User for:

1) Individual mailbox

2) Calendar delegation

3) Access to common drive.

4) Attendance tracking.

5) Should NOT be granted access to business applications.

Term
Generic ID
Definition

Belong to a group or departments, not to any specific individual in that group or department.

 

May be assigned to an IT function or process. The person who is responsible for the use of the ID may or may not (but should) be the same person responsible for the function or process.

Term
Authentication (description and uses)
Definition

1) Validates Identity

2) Complement (is not the same as) identity and entitlements.

3) Employs cryptographic mechanism and keys

4) unlocks resources gateways.

Term
Multifactor Authentication
Definition

1) Something you know, e.g., password.

2) Something you have, e.g., badge.

3) Something you are, e.g., finger print.

Term
Authentication Features are driven by? (three things)
Definition

1) Who is authenticated: drvies selection of optimal mechanism, e.g., human vs remote peer.

2) What is authenticated: define the gateway that is unlocked and what stays protected.

3) How does it work? Off the shelf, custom, or combination? 

Term
Typical Authentication Process with password
Definition

1) Workstation: User enters username and password.

2) OS Server: Server Application Program (SAP) DBMS Interface: Initialize database session using applciation user identifier.

3) OS Server: SAP DBMS Interface: Query database for stored user password (not a DBMS password)

4) Decrypt password (if stored encrypted) and compare to the password entered by user.

5) If no match, return message that login in invalid. Otherwise, grant access.

 

Term
Masking (password)
Definition

1) Can refer to hiding the password displayed on the screen by showing dots instead of the actual password characters.

 

2) Can also refer to the appending of a common application password onto the end of a specific user password. This means that the full password can be protected.

Term
Single Sign On
Definition
Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.
Term
Federated Identity
Definition

(Module 4) The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.

 

Term
Authorization/Entitlements (definiton)
Definition
What objects can the subject access and what actions (e.g., read, write, execute) is the subject allowed to perform on the objects it has access to.
Term
Access Control Level: Operating System
Definition
– Rights to restrict, execute and/or manipulate
data and program files
– Rights to copy, rename, or delete data files
stored as OS files
Term
Access Control Level: DBMS
Definition
– Rights to tables within data files
– Rights to create and execute procedures that
manipulate table structure and data
Term
Types of Threats
Definition

1) Bypass

2) Backdoors

3) Impersonation (i.e., spoofing)

4) Man-in-the-middle.

etc., etc.

Supporting users have an ad free experience!