Term
|
Definition
Process of verifying that people are who they claim to be prior to issuing them credentials
|
|
|
Term
Self-service password reset systems - |
|
Definition
Password recovery systems. Reduces overhead. The most common may be “I Forgot my Password”. Has inherent risks due to its automated nature.
|
|
|
Term
|
Definition
Remembers past passwords and prevents users from reusing passwords
|
|
|
Term
|
Definition
Prevents users from changing their password until a certain period of time has password
|
|
|
Term
|
Definition
Holds an embedded certificate; Holds the user’s private key, and it is matched with a public key.
PKI supports the use of smart cards
Common Access Card (CAC) - Smart card used by DOD (Department of Defence)
Personal Identity Verification (PIV) - Smart card used by federal agencies
|
|
|
Term
|
Definition
Issues an OTP (One time password)
|
|
|
Term
|
Definition
Uses an algorithm to combine a secret key and an incrementing counter
Uses HMAC for hashing
OTP remains valid until used
|
|
|
Term
|
Definition
Password changes at certain time intervals
Password usually expires after 30 seconds
Biometrics - Uses biological data for authentication
Geolocation - used to determine the location of the user
Gestures - performing a set of actions for authentication
Kerberos
Uses tickets for authentication
KDC issues ticket granting tickets (TGT)
Tickets are time stamped, meaning all systemed have to be synchronized within five minutes of each other.
Has a database of subjects and users (active directory)
Uses port 88
|
|
|
Term
|
Definition
Extension of X.500 standard and is used to communicate with directories, such as the active directory, which it is used with frequently.
Port 389
|
|
|
Term
|
Definition
|
|
Term
|
Definition
Enhances security by requiring users to use and remember only one set of credentials
Can also be used with a federated database / federation (A group of organizations sharing a similar database)
Can also be used with SAML
XML - based
Used for web based portals
Three components :
Principal - The user
Identity provider - Provides the credentials
Service provider - The organizations in a federation\
|
|
|
Term
|
Definition
|
|
Term
|
Definition
authenticates a remote in session only with a cleartext password. Antiquated.
|
|
|
Term
|
Definition
|
|
Term
|
Definition
-
Uses roles based on jobs and functions
-
Uses a matrix that matches the roles with required privileges
-
Commonly accomplished with group-based privileges. Reduces administrative overhead.
|
|
|
Term
|
Definition
|
|
Term
|
Definition
-
Every object has an owner
-
Owner established access for the objects
-
Owner has full, explicit control of the object
-
NTFS is used by Microsoft and is the most commonly used DAC
|
|
|
Term
Mandatory AC (MAC) (Implemented often in government situations)
|
|
Definition
|
|
Term
|
Definition
-
Evaluates attributes and grants access based on the value of these attributes
-
Subject: Typically a user
-
Object: Resource that the user is trying to access
-
Action: Task user is attempting to perform
-
Environment: Everything outside of the other attributes
|
|
|