Authentication Flashcards

(90 cards)

1
Q

Three key elements of security

A

AUthenticaion
AUthorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It relates to access control

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__ is the process by which
resources or services are granted or denied

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The presentation of credentials or identification

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The verification of credentials to ensure that they are genuine and not fabricated

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Granting permission for admittance

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__ is the right to use specific resources

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHat is AAA?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AAA

provides a way of
identifying a user, typically with a password

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AAA

determines whether the user
has the authority to carry out certain tasks

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AAA

___ measures the resources a user “consumes” during each network session

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Uses of Accounting DATA

A
  • TO find billing problems
  • for billing
  • for planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These are dedicated to performing AAA functions and can provide significant advantages in a network

A

AAA servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ are something you have,
something you are, or something you know

A

Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of authentication credentials

A
  • Passwords
  • One-time passwords
  • Standard biometrics
  • Behavioral biometrics
  • Cognitive biometrics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passwords

Dyanmic passwords that change frequently

A

One-time passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Passwords

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Most common type of OTP

A

time-synchronized OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Passwords

used in junction with a token

A

Time-synchronized OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PASSWORDS

Authentication server displays a _____ (_____) to the user

A

challenge, random number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Passwords

Uses a person’s unique characteristics for authentication (what he is)

A

Standard Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PASSWORDS

Types of fingerprint scanners

A

static
dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PASSWORDS

Disadvantages of Standard Biometrics

A
  • costs
  • readers are not always foolproof
  • how can you change your password if it’s your fingerprint?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PASSWORDS

Authentciates by normal actions that the user performs

A

Behavioral Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
PASSWORDS: Behavioral Attempts to recognize user's unique typing rhythm
Keystroke Dynamics, Behavioral Biometrics
26
PASSWORDS: Behavioral Keystroke dynamics uses two unique typing variables
- dwell time - flight time
27
PASSWORDS: Behavioral Uses charactieristics of a person's voice
voice recognition
28
PASSWORDS: Behavioral speaking two words together in a way that one word "bleeds" into the next word and becomes part of user's speech pattern
Phonetic cadence, voice recognition
29
PASSWORDS: Behavioral When and from where a user normally accesses a system
Computer footprint
30
PASSWORDS: Behavioral a simple form of two-factor authentication and is REQUIRED by the US now
Computer Footprinting
31
PASSWORDS Related to the perception, thought, process, and understanding of the user
Cognitive Biometrics
32
PASSWORDS Easier for the user to remember because it is based on the user’s life experiences
Cognitive Biometrics
33
PASSWORDS: Cognitive examples of cognitive biometrics
requires user to identify specific faces
34
AUTHENTICATION MODELS
- One-factor - two-factor - three-factor
35
AUTHENTICATION MODELS Uses only one authentication credential, such as a password
One-factor
36
AUTHENTICATION MODEL Enhances security, particularly if different types of authentication methods are used (Password and token)
two-factor
37
AUTHENTICATION MODEL Requires that a user present three different types of authentication credentials
three-factor
38
AUTHENTICATION MODEL Using a single authenticated ID to be shared across multiple networks
Identitiy management
39
AUTHENTICATION MODEL When those networks are owned by different organizations
Federated Identity Management (FIM)
40
AUTHENTICATION MODEL Using one authentication to access multiple accounts or applicants
single sign-on
41
Originally introduced in 1999 as .NET Passport
Windows Live ID
42
Once authenticated, the user is given an encrypted time-limited “global” cookie
Windows Live ID
43
Never became widely used
Windows Live ID
44
Users control digital identities with digital ID cards
Windows CardSpace
45
WINDOWS CARDSPACE Types of cards
- Managed cards - Personal cards
46
A decentralized open source FIM
OpenID
47
Does not require specific software to be installed on the desktop
OpenID
48
An ___ identity is only a URL backed up by a username and password. ___ provides a means to prove that the user owns that specific URL
OpenID
49
Not very secure--dependent on DNS
OpenID
50
Authentication can be provided on a network by a dedicated AAA or ___
Authentication servers
51
Types of AAA servers
- RADIUS - Kerberos - TACACS+ - Generic servers built on the Lightweight Directory Access Protocol (LDAP)
52
AAA SERVER Developed in 1992, Industry standard with widespread support
Remote Authentication Dial in User Service (RADIUS)
53
AAA SERVER Suitable for what are called “high-volume service control applications”
RADIUS
54
AAA SERVERS A RADIUS client is typically a device such as a ___ or wireless _____
dial=up server, access point
55
AAA SERVER An authentication system developed by the Massachusetts Institute of Technology (MIT)
Kerberos
56
AAA SERVER server issues a ticket to the user >> user presents ticket to the network or service >> service examines the ticket to verify identity of user
Kerberos
57
57
AAA SERVER -Developed by Cisco to replace RADIUS -More secure and reliable than RADIUS
Terminal Access Control Access Control System (TACACS+)
58
AAA SERVER - A database stored on the network itself that contains information about users and network devices - Can be used with RADIUS
Lightweight Directory Access Protocol
59
AAA SERVER LDAP: Standard for directory services. Created by ISO
X.500
60
AAA SERVER LDAP: Capability to look up information by name
White-pages service
61
AAA SERVER LDAP: brows and search for information by category
Yellow-pages service
62
AAA SERVER LDAP: info is held in a ___
directory information base (DIB)
63
AAA SEVER LDAP: entries in DIB are arranged in a tree structure called ____
Directory information tree (DIT)
64
AAA SERVER Protocol for a client application to access an X.500 directory
Directory Access Protocol
65
AAA SERVER sometimes called X.500 Lite
LDAP
66
AAA SERVER is an open protocl
LDAP
67
AAA SERVER simpler subset of DAP
LDAP
68
the "envelope" that carries data used for authentication
EXTENDED AUTHENTICATION PROTOCOLS
69
EXTENDED AUTHENTICATION PROTOCOLS thre categories
- Authentication legacy protocols - EAP weak protocols - EAP strong protocols
70
EXTENDED AUTHENTICATION PROTOCOLS No longer extensively used for authentication
Authentication Legacy Protocol
71
EXTENDED AUTHENTICATION PROTOCOLS Legacy: Sends passwords in the clear
Password Authentication Protocol (PAP)
72
EXTENDED AUTHENTICATION PROTOCOLS Legacy: safer than PAP, but vulnerable
Challenge-Handshake AUthentication Protocol
73
EXTENDED AUTHENTICATION PROTOCOLS still used but has vulnerabilities
EAP Weak Protocols
74
EXTENDED AUTHENTICATION PROTOCOLS Weak: vulnerable to offline dictionary attacks
EAP MD5
75
EXTENDED AUTHENTICATION PROTOCOLS Weak: also vulnerable to offline dictionary attacks. Can be tracked faster than WEP
Lightweight EAP
76
EXTENDED AUTHENTICATION PROTOCOLS Strong: uses certifications for client and server. Uses large windows networks
EAP with transport layer security
77
EXTENDED AUTHENTICATION PROTOCOLS Strong: no client-side certificate. Easier to implement than EAP-TLS
EAP with tunneled TLS and Protected EAP
78
Transmissions are routed through networks or devices that the organization does not manage and secure
Remote Authentication and Security
79
remote authentication and security usually includes:
- using remote access services - installing a virtual private network - maintaining a consistent remote access policy
80
Any combination of hardware and software that enables access to remote users to a local internal network
Remote Access Services
81
RAS One of the most common types of RAS
Virtual Private Network
82
RAS Uses an unsecured public network, such as the Internet, as if it were a secure private network
VPN
83
RAS: VPN types of VPN
- remote access VPN/ VPN private dial-up network - site-to-site VPN
84
RAS __ transmissions are achieved through communicating with endpoints
VPN
85
RAS end of the tunnel between VPN devices
Endpoint
86
RAS Aggregates hundred or thousands of multiple connections
VPN concentrator
87
RAS: VPN __ offer the most flexibility in how network traffic is managed
Software-based VPN
88
RAS: VPN __ generally tunnel all traffic they handle regardless of the protocol
Hardware-based VPN
89
RAS: recommendations for remote access policies:
- consistent - responsibility of IT dept - create a standard that all depts agree to