Shared Flashcard Set

Details

fight me
fight me
19
Astronomy
Not Applicable
08/30/2018

Additional Astronomy Flashcards

 


 

Cards

Term
Identity Proofing
Definition

 Process of verifying that people are who they claim to be prior to issuing them credentials

 

Term
Self-service password reset systems -
Definition

Password recovery systems. Reduces overhead. The most common may be “I Forgot my Password”. Has inherent risks due to its automated nature.

 

Term
Password history
Definition

Remembers past passwords and prevents users from reusing passwords

 

Term
Min password age
Definition

Prevents users from changing their password until a certain period of time has password 

 

Term
Smart cards
Definition

Holds an embedded certificate; Holds the user’s private key, and it is matched with a public key.

PKI supports the use of smart cards

Common Access Card (CAC) - Smart card used by DOD (Department of Defence)

Personal Identity Verification (PIV) - Smart card used by federal agencies 

 

Term
Token / key fobs
Definition

Issues an OTP (One time password)

 

Term
HOTP (HMAC - based OTP)
Definition

Uses an algorithm to combine a secret key and an incrementing counter

Uses HMAC for hashing

OTP remains valid until used

 

Term
TOTP (Time - Based OTP)
Definition

Password changes at certain time intervals

Password usually expires after 30 seconds

Biometrics - Uses biological data for authentication

Geolocation - used to determine the location of the user

Gestures - performing a set of actions for authentication

Kerberos

Uses tickets for authentication

KDC issues ticket granting tickets (TGT)

Tickets are time stamped, meaning all systemed have to be synchronized within five minutes of each other. 

Has a database of subjects and users (active directory)

Uses port 88

 

Term
LDAP
Definition

Extension of X.500 standard and is used to communicate with directories, such as the active directory, which it is used with frequently. 

Port 389

 

Term
LDAPS (Secure LDAP)
Definition

Uses SSL / TLS 

Port 636

 

Term

 

 

  • SSO (Single Sign On)

 

 

Definition

Enhances security by requiring users to use and remember only one set of credentials 

Can also be used with a federated database / federation (A group of organizations sharing a similar database) 

Can also be used with SAML 

XML - based

Used for web based portals

Three components : 

Principal - The user

Identity provider - Provides the credentials

Service provider - The organizations in a federation\

 

Term

 

    • Transitive Trusts

Definition

 

  • A trusts B

  • B trusts C

  • So A trusts C

  • Can be problematic from a security perspective

  • Allows for SSO

Term
PAP
Definition

 authenticates a remote in session only with a cleartext password. Antiquated.

 

Term
CHAP
Definition

 

  • Improvement on PAP, uses a three way challenge handshake. (CHAP challenges the user for credentials. User responds with credentials. CHAP replies back with an accept or deny message. Repeats this handshake constantly throughout the transmission for added security.)

Term
Role-BAC (RBAC)
Definition

 

  • Uses roles based on jobs and functions

  • Uses a matrix that matches the roles with required privileges

  • Commonly accomplished with group-based privileges. Reduces administrative overhead.

Term

 

  • Rule-BAC (RBAC)

Definition

 

  • Based on a set of approved actions. Usually accomplished with the use of an access control list.

  • Can modify rules in response to security incidents

Term
Discretionary AC (DAC)
Definition

 

  • Every object has an owner

  • Owner established access for the objects

  • Owner has full, explicit control of the object

  • NTFS is used by Microsoft and is the most commonly used DAC

Term

Mandatory AC (MAC) (Implemented often in government situations)

 

Definition

 

  • Uses sensitivity labels for users and data

  • Sensitivity labels often reflect classification levels of data and clearances granted to individuals

Term

 

  • Attribute based access control

Definition
  • Evaluates attributes and grants access based on the value of these attributes

  • Subject: Typically a user

  • Object: Resource that the user is trying to access

  • Action: Task user is attempting to perform

  • Environment: Everything outside of the other attributes

 

Supporting users have an ad free experience!