Shared Flashcard Set

Details

Security+
Study for the Security+ Objectives
17
Computer Science
Professional
07/17/2007

Additional Computer Science Flashcards

 


 

Cards

Term
Mandatory Access Control (MAC)
Definition
In MAC access is controlled by comparing an object's security designation and a user's clearance.
Term
Discretionary Access Control (DAC)
Definition
In DAC, access to each object is controlled on a customized basis based on a users identity. Objects are controlled with an Access Control List(ACL) of subjects who are allowed to access the object.
Term
Role Based Access Control (RBAC)
Definition
In RBAC, users are asigned to pre-defined roles, and network objects are configured to allow access only to specific roles. roles are created independent of user accounts.
Term
Kerberos
AUTHENTICATION
Definition
Kerberos authentication is based on a time-sensitive ticket granting system.
1. User logs on to the domain
2. User requests a ticket granting Ticket(TGT) from the authenticating server
3. The Auth server responds with a Time Stamped TGT
4. The user presents the TGT back to the auth server and requests a service ticket to access a specific resource.
5. The auth server responds with a service ticket
6. The user presents the service ticket to the resource.
7. the resource authenticates the user and allows access.
Term
Challenge Handshake Authentication Protocol (CHAP)
AUTHENTICATION
Definition
CHAP is a username/password authentication scheme.
1. Client logs on
2. The authenticating server sends a challenge message containng a random value
3. The client encrypts the same calue with the client password stored in its database
4. The auth server encrypts the same value with the client password stored in its database
5. If the two values match the user is authenticated
Term
Tokens
AUTHENTICATION
Definition
Tokens are physical objects, such as smart cards or ID Badges that store authentication information. tokens can store personal ID numbers(PIN), information about the user, or passwords. Unique token values can be generated by special devices in response to a challenge from an authenticating server or by using independent algorithms.
Term
Biometrics
AUTHENTICATION
Definition
Biometrics are authentication schemes based on individuals' physical characteristics. this can involve a fingerprint scanner, a retinal scanner, or voice-recognition and face recognition software. Because biometric authentication is currently very expensive to implement, it isn't as widely adopted as other authentication methods.
Term
Multi-Factor
AUTHENTICATION
Definition
Multi Factor authentication scheme that requires validation of at least two of the possible authentication factors. It can be any combination of who you are(Biometrics), what you have(Tokens, Cards, etc), and what you know(Passwords)
Term
Mutual Authentication
AUTHENTICATION
Definition
Mutual Authentication is a security mechanism that requires that each party in a communication verify its identity. First, a service or resource verifies the client's credentials and then the client verifies the resource's credentials.
Term
User Name/Pasword
AUTHENTICATION
Definition
The combination of a user name and password is one of the most basic authentication schemes. In this type of authentication, a user's credentials are compared against credentials stored in a database.
Term
User Name/Pasword
AUTHENTICATION
Definition
The combination of a user name and password is one of the most basic authentication schemes. In this type of authentication, a user's credentials are compared against credentials stored in a database.
Term
Social Engineering Attacks
Definition
A social engineering attack is a type of attack that uses deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines. Social engineering is often a precursor to another type of attack. Attacks can come ina variety of methods: in person, through email, or over the phone
Term
DoS Attack (Denial of Service)
Definition
A Denial of Service (DoS) attack is a type of software attack in which an attacker attempts to disable systems that provide network services by:
1. Flooding a network link with data to consume all available bandwidth.
2. Sending data designed to exploit known flaws in an application.
3. Sending multiple service requests to consue a system's resources.
TARGETS: SERVERS, ROUTERS
Term
DDoS (Distributed Denial of Service Attack)
Definition
A DDoS attack is a type of DoS atack that uses multiple computers on disparate networks to launch the attack from many simultaneous sources. The attacker introduces unauthorized software called a zombie or drone that directs the computers to launch the attack.
Term
Back Door Attack
Definition
A backdoor atack is a type of software attack where an attacker creates a software mechanism called a backdoor to gain access to a computer. The backdoor can be a software utility or an illegitimate user account. Typically, a backdoor is delivered through use of a Trojan horse or other malware. Backdoor software typically listens for commands from the attacker on an open port.
Term
Spoofing Attack
Definition
An IP Spoofing attack is a type of softare attack where an attaker crates IP Packets with a forges source IP addres and uses those packets to gain access to a remote system. One sign of an IP spoofing attack is a network packet from an external source that appears to have an internal source address.
Term
Man In The Middle Attack
Definition
A man in the middle attack is a type of software attack where an attacker inserts himself between two hosts to gain access to their data transmissions. The attacker captures and reads each packet, responds to it, and forwards it to the intended host, so that both the sender and receiver believe that they are communicating directly with each other. This deception allows attackers to manipulate the communication rather than just observe it passively.
Supporting users have an ad free experience!