What is:
3 Types of Authentication
Password Types
Password Policies
Tool to Assist with Password Management
KeyPassXC
Strong Password - Complexity
12-15 chars
Upper and Lowercase
Numbers and Symbols
NIST Password Recommendations - 800-63B
What does Salting do?
Adds random bits to a value (password) and creates a Hexidecimal representation. SHA 3 (256) will create a 256 bit Hex Hash.
What is a smart card?
What is it an example of?
Card with an embedded certificate that identifies the individual. Usually used with a PIN or password. This is an example of 2FA.
What is a Hardware token?
Device that displays a number which changes every X seconds. Considered a dynamic or one time password. Used with Username and Password for 2FA.
What are the two types of Hardware tokens?
Examples of Software Tokens and One Time Passwords (OTP).
What is a proximity card?
A card that has electronically embedded data that will be transmitted to a reader when the card passes through a magnetic field which excites the inductor in the card.
Examples of Biometrics
Biometric Error Types
Example of 2 Step Verification
Corporate Google Accounts often use Username and Password followed by a 6 digit code sent to a users cell via SMS, voice call or Google mobile app.
What is SSO
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications
What is Kerberos SSO and how does it work?
What is Federated Access?
Where different organizations use trusted identity providers rather than sharing credentials of their users.
What is SAML?
Security Assertion Markup Language.
A Federated Identity Management system for web based app servers to provide SSO.
Made up of 3 key roles:
How is offline authentication achieved?
Locally cached credentials.
What are the methods for device authentication?
In the context of access controls, what are subjects and objects?
Subjects - The person, bot, system or device requesting the access.
Objects - The data, file, server, facility or component the subject wants access to
What are 4 attributes that can control the access of a subject?