What is access control?
Access control authenticates and authorize individuals to access information that they are allowed to see & use.
What are the 3 authentication categories?
What are some problems with knowledge-based passwords?
What is the problem with password managers?
- Runs in memory, can be leaked via memory forensic
What are three forms of password attacks?
What is the issue with Single Sign-On systems?
Single point of failure.
What are some threats with 2FA?
- Zeus/MITM attack that steals 2FA data
What is the issue with graphical passwords?
What are tokens?
What are smart cards?
What are RFID tags?
What are biometrics?
What are the 4 requirements of characteristics as a biometric?
How is accuracy measured in biometrics?
False acceptance rate should be 0 and true acceptance rate should be 1.
Receiver Operating Characteristic shows trade off between FAR and TAR.
What are some iris scanning characteristics?
What are some retinal scanning characteristics?
What are some fingerprinting characteristics?
What are some facial recognition characteristics?
What are the pros and cons of multi-factor authentication using biometric?
Pros:
Cons:
What are the 3 types of access control systems?
What is discretionary access control?
Owner Group World
RWX RWX RWX
What is role-based access control?
Assign rights based on organization roles allows the organization to address the principle of least privilege.
Individual only needs the access they need since access connected to their job role / scope.
What is mandatory access control?
Access to resource objects controlled by the OS based on sysadmin configured settings.
What is the principle of least privilege?
PLOP requires limiting privileges to the minimum necessary to perform the job or task.
Reduces the risk of unauthorized access.