Shared Flashcard Set

Details

Security+
GENERAL SECURITY CONCEPTS
37
Computer Science
Not Applicable
04/24/2008

Additional Computer Science Flashcards

 


 

Cards

Term
AAA is made up of three distinct but interdependent parts:
Definition
  1. access control
  2. authentication
  3. auditing
Term
____ consists of the rules for controlling the methods and conditions of access to your system.
Definition
Access control
Term
____ defines the methods for setting the rules for establishing the methods of authentication of the service or user requesting access to the system or resources.
Definition
Authentication
Term
____ contains the suggestions and procedures for monitoring access and authentication processes in your systems, and secures the log files and records of these efforts.
Definition
Auditing
Term

The system administrator is responsible for access privileges in the ____ access control model

Definition
MAC (Mandatory Access Control)
Term
The ___ model has a level of access that is defined and hard-coded in the OS or application, and not easily changed
Definition
MAC (Mandatory Access Control)
Term

In the ___ users cannot share resources dynamically

Definition
Mandatory Access Control (MAC)
Term
MAC model uses ___ to identify the users who have
permissions to a resource
Definition
predefined access privileges
Term

The MAC model is a ___ model and as a result it can be very ___.

Definition

static

restrictive

Term

 

In the MAC model, all objects are given security labels known as ___ and are classified accordingly. Then all users are given specific ____ as to what they are allowed to access.

Definition

sensitivity labels

security clearances

Term
____ best describes a MAC model.
Definition
Lattice terminology
Term

Only the owner of the resource is responsible for access privileges in the _____ access control model

Definition
DAC (Discretionary Access Control)
Term

The DAC model uses ___ to map a user's to access permissions to a resource.

Definition
Access Control Lists (ACLs)
Term
Access control lists provides the most ____ to protected objects
Definition
granular access
Term

The ____ model uses only the identity of the user or specific process to control access to a resource. This creates a security loophole for ____

Definition

DAC (Discretionary Access Control)

Trojan horse attacks

Term
Access control using the ___ model is based on the role or responsibilities users have in the organization to determine access permissions.
Definition
RBAC (Role Based Access Control)
Term
RBAC access control model uses ____ to identify the users who have permissions to a resource
Definition
the role or responsibilities users have in the organization
Term

What type of authentication is depicted below:

  • The authentication process uses a Key Distribution Center (KDC) to orchestrate the entire process.
  • The KDC authenticates the network.
  • Principles can be users, programs, or systems.
  • The KDC provides a ticket to the network.
  • Once this ticket is issued, it can be used to authenticate against other principles.
  • This occurs automatically when a request or service is performed by another network.
Definition
Kerberos system.
Term

Which authentication method does the following sequence:

  • Logon request
  • encrypts value response
  • server
  • challenge
  • compare encrypts results
  • authorize or fail
Definition
CHAP (Challenge Handshake Authentication Protocol)
Term

What type of authentication is depicted below:

  • The initiator sends a logon request from the client to the server.
  • The server sends a challenge back to the client.
  • The challenge is encrypted and then sent back to the server.
  • The server compares the value from the client and if the information matches, the server grants authorization.
  • If the response fails, the session fails and the request phase starts over
Definition
CHAP (Challenge Handshake Authentication Protocol)
Term
The CHAP authentication method does not use username and password combinations but uses a _____ which is stored locally in ____.
Definition

Shared Secret

clear text

Term
The CHAP authentication method is commonly used to ______
Definition
encrypt passwords
Term
The CHAP authentication performs the handshake process when ___ a connection; and then at ___ during the transaction session.
Definition

first establishing

random intervals

Term

What type of authentication is depicted below:

  • A certificate being handed from the server to the client once authentication has been established.
  • If you have a pass, you can wander throughout the network.
  • BUT limited access is allowed.
Definition

Certificate system

Term
What is the first thing a computer system requires from a user for correct authentication?
Definition
Username and Password
Term
____ can be intercepted and are the least secure form of authentication.
Definition
Usernames and passwords
Term

What type of authentication is depicted below:

  • If your token does not grant you access to certain information, that information will either not be displayed or your access will be denied.
  • The authentication system creates a token every time a user or a session begins.
  • At the completion of a session, the token is destroyed
Definition
Security Token system.
Term

What type of authentication is depicted below:

 

verifying and validating the authenticity of an identity using more than one validation mechanism.

Definition
Multi-factor
Term

What type of authentication is depicted below:

 

refers to two parties authenticating each other suitably. In technology terms, it refers to a client or user authenticating themselves to a server and that server authenticating itself to the user in such a way that both parties are assured of the others' identity.
Definition
Mutual: (two-way authentication)
Term
What authentication type uses physical characteristics to identify the user and makes use of hand scanners, fingerprints, retinal scanners or DNA structure to identify the user?
Definition
Biometrics
Term
____ are the strongest (and the costliest) for of authentication
Definition
Biometrics
Term

____ uses username and password combinations but transmits the username and password in clear text.

Definition
Password Authentication Protocol (PAP)
Term

___ does not use username and password combinations but uses a Shared Secret which is stored locally in clear text.

Definition
Challenge Handshake Authentication Protocol (CHAP)
Term

___ is an authentication and accounting service that uses username and password combinations but transmits the username and password in encrypted form.

Definition
Remote Authentication Dial-In User Service (RADIUS)
Term

____ does not use username and password combinations but uses a Shared Secret which is stored locally in encrypted form.

Definition
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
Term

___ is capable of mutual authentication of both the client and the server.

Definition
MS-CHAP version 2
Term
A ___ is a type of badge or card that can allow access to multiple resources including buildings, parking lots, and computers.
Definition
Smart card
Supporting users have an ad free experience!