Podcast
Questions and Answers
Knowledge-based authentication (KBA) often requires users to answer at least one ______ question.
Knowledge-based authentication (KBA) often requires users to answer at least one ______ question.
secret
Dynamic KBA does not require the person to have provided the questions and answers ______.
Dynamic KBA does not require the person to have provided the questions and answers ______.
beforehand
A ______ is a physical device used to add extra protection to online accounts and systems.
A ______ is a physical device used to add extra protection to online accounts and systems.
security key
Tokens or key fobs often display a number that changes periodically, typically every ______ seconds.
Tokens or key fobs often display a number that changes periodically, typically every ______ seconds.
Signup and view all the answers
HOTP stands for HMAC-based One-Time ______.
HOTP stands for HMAC-based One-Time ______.
Signup and view all the answers
A soft token is generally an app downloaded on a computer or mobile ______.
A soft token is generally an app downloaded on a computer or mobile ______.
Signup and view all the answers
Common access cards (DoD) are examples of ______ used for secure identification.
Common access cards (DoD) are examples of ______ used for secure identification.
Signup and view all the answers
Soft tokens generate a one-time passcode for two-factor or multi-factor ______.
Soft tokens generate a one-time passcode for two-factor or multi-factor ______.
Signup and view all the answers
Also known as False Acceptance Rate (FAR) – identifies the percentage of times the false acceptance occurred (false negative) – true ______ (good)
Also known as False Acceptance Rate (FAR) – identifies the percentage of times the false acceptance occurred (false negative) – true ______ (good)
Signup and view all the answers
True ______ – accurately determines a positive match
True ______ – accurately determines a positive match
Signup and view all the answers
True ______ – accurately determines a non-match
True ______ – accurately determines a non-match
Signup and view all the answers
______ analysis is the systematic study of animal locomotion
______ analysis is the systematic study of animal locomotion
Signup and view all the answers
Multifactor Authentication requires two (or more) types, including something you know AND something you ______
Multifactor Authentication requires two (or more) types, including something you know AND something you ______
Signup and view all the answers
Fingerprint, Vein Matching, and Retina Imaging are examples of different types of ______
Fingerprint, Vein Matching, and Retina Imaging are examples of different types of ______
Signup and view all the answers
______ Dynamics refers to the study of typing patterns and their variations among users.
______ Dynamics refers to the study of typing patterns and their variations among users.
Signup and view all the answers
In geolocation, a GPS-tracked individual allows systems to be authenticated through geographic ______
In geolocation, a GPS-tracked individual allows systems to be authenticated through geographic ______
Signup and view all the answers
A ______ account is any account not owned by your organization.
A ______ account is any account not owned by your organization.
Signup and view all the answers
PayPal acts as a ______ in a retail transaction.
PayPal acts as a ______ in a retail transaction.
Signup and view all the answers
Shared and ______ accounts can be used by more than one person.
Shared and ______ accounts can be used by more than one person.
Signup and view all the answers
Privileged access management (PAM) helps protect organizations from ______.
Privileged access management (PAM) helps protect organizations from ______.
Signup and view all the answers
By using two different accounts, administrators can configure strict ______ access.
By using two different accounts, administrators can configure strict ______ access.
Signup and view all the answers
Organizations often have account management policies that include disabling accounts rather than ______.
Organizations often have account management policies that include disabling accounts rather than ______.
Signup and view all the answers
Disabling is preferred over deleting ______ due to potential loss of associated security keys.
Disabling is preferred over deleting ______ due to potential loss of associated security keys.
Signup and view all the answers
PAM is also known as privileged identity management (PIM) or privileged access ______.
PAM is also known as privileged identity management (PIM) or privileged access ______.
Signup and view all the answers
Attestation security permissions are also known as identity and access ______.
Attestation security permissions are also known as identity and access ______.
Signup and view all the answers
Federation defines policies, protocols, and practices to manage ______ across systems and organizations.
Federation defines policies, protocols, and practices to manage ______ across systems and organizations.
Signup and view all the answers
A one-way trust means the child trusts the parent but the parent does not trust the ______.
A one-way trust means the child trusts the parent but the parent does not trust the ______.
Signup and view all the answers
Security Assertion Markup Language (SAML) is used to enable single sign-on (SSO) through an ______ provider.
Security Assertion Markup Language (SAML) is used to enable single sign-on (SSO) through an ______ provider.
Signup and view all the answers
OAuth is an open-standard authorization protocol providing secure designated ______.
OAuth is an open-standard authorization protocol providing secure designated ______.
Signup and view all the answers
SAML is designed for authentication and authorization while OAuth was built solely for ______.
SAML is designed for authentication and authorization while OAuth was built solely for ______.
Signup and view all the answers
Transitive trust means that trust extends to other trusted ______.
Transitive trust means that trust extends to other trusted ______.
Signup and view all the answers
Identity governance is vital to an organization's information ______.
Identity governance is vital to an organization's information ______.
Signup and view all the answers
Discretionary Access Control relies on decisions made by the end user to set the proper ______.
Discretionary Access Control relies on decisions made by the end user to set the proper ______.
Signup and view all the answers
In Mandatory Access Control, access is based on the security ______ of the subject and classification of the object.
In Mandatory Access Control, access is based on the security ______ of the subject and classification of the object.
Signup and view all the answers
MAC is primarily used in environments requiring higher levels of ______ and structure.
MAC is primarily used in environments requiring higher levels of ______ and structure.
Signup and view all the answers
In MAC, a subject cannot pass access ______ to another subject.
In MAC, a subject cannot pass access ______ to another subject.
Signup and view all the answers
A key to Mandatory Access Control is that the subject’s label must ______ the object’s label to gain access.
A key to Mandatory Access Control is that the subject’s label must ______ the object’s label to gain access.
Signup and view all the answers
ABAC stands for Attribute-Based ______ Control.
ABAC stands for Attribute-Based ______ Control.
Signup and view all the answers
All files on one system in MAC can share the same ______.
All files on one system in MAC can share the same ______.
Signup and view all the answers
A trusted computer system ensures that labels cannot be arbitrarily ______.
A trusted computer system ensures that labels cannot be arbitrarily ______.
Signup and view all the answers
Study Notes
Knowledge-Based Authentication (KBA)
- Authenticates users by asking them secret questions.
- Often used as part of multi-factor authentication (MFA) or for password retrieval.
- Dynamic KBA verifies identity without requiring users to pre-set questions and answers
Something You Have
- Smart card - Requires Public Key Infrastructure (PKI) & Embedded certificate
-
Tokens or Key Fobs - Display one-time passwords (OTPs) that change periodically.
- HOTP - Uses HMAC (Hash-based Message Authentication Code) and a counter to create an OTP that remains valid until used.
- TOTP - Similar to HOTP but uses a timestamp instead of a counter. OTPs expire after 30 seconds.
- CACs and PIVs - Common Access Cards (DoD) and Personal Identity Verification (Federal Agencies).
Security Keys
- Physical devices that add an extra layer of security to online accounts.
- Often resemble thumb drives or tags.
- May include features like near-field communication (NFC) or fingerprint scanners.
- Used for 2FA or MFA to protect against account takeover.
Soft Tokens
- Digital security devices that generate OTPs for 2FA or MFA.
- Typically apps installed on computers or mobile devices.
- Used to protect sensitive data and network information.
Types of Biometrics
- Fingerprint
- Vein Matching
- Retina Imaging
- Iris Scan
- Facial Recognition
- Voice Recognition
- Gait Analysis
Something You Do
- Signature Dynamics - Analyzed for user recognition
- Voice-Scan
- Keyboard Dynamics - Tracks typing patterns for authentication.
Somewhere a User is (Geolocation)
- Authenticates users based on their GPS location.
Multifactor Authentication (MFA)
- Requires two or more authentication factors.
- Common combinations:
- Something you know (password) AND something you have (security key).
- Something you know (password) AND something you are (biometrics).
Privileged Access Management (PAM)
- Protects organizations by monitoring, detecting, and preventing unauthorized access to critical resources.
- Also known as Privileged Identity Management (PIM) or Privileged Access Security (PAS)
Disabling and Deleting User Accounts
- Organizations often have policies for managing user accounts, including disabling or deleting accounts.
- Disabling is preferred over deleting, as deleting also removes encryption and security keys.
Attestation
- Verifies and manages access to systems, applications, and resources.
- Ensures only authorized individuals have access based on their roles and responsibilities.
- A key component of identity governance, crucial for information security.
Comparing Authentication Services
-
Federation and Trusts (ADFS) - Defines policies for managing identities across systems and organizations. Allows access across domains.
- Trust relationships can be:
- One-way (child trusts parent)
- Two-way (mutual trust)
- Non-transitive (trust only between specific domains)
- Transitive (trust extends to other trusted domains)
- Trust relationships can be:
SAML (Security Assertion Markup Language)
- An open standard for exchanging authentication and authorization data.
- XML-based. Enables Single Sign-On (SSO).
- Identity providers (IdP) authenticate users and pass tokens to service providers (SP) for authorization.
OAuth
- An open standard authorization protocol. Allows applications secure access to resources.
- Example: Allowing ESPN to access your Facebook profile without giving them your password.
- Focuses on authorization, while SAML is designed for authentication and authorization.
Discretionary Access Control (DAC)
- Access permissions are set by the data owner.
- Subject's permissions can be inherited by programs they execute.
Mandatory Access Control (MAC)
- Based on security clearance of the subject and classification of the object (resource).
- Each user assigned a clearance level, and objects have classification labels.
- Access decisions are made by the system, not the data owner.
- Used in highly secure environments.
- Typically used for classified data.
Attribute-Based Access Control (ABAC)
- Assigns access and privileges based on attributes or characteristics.
- Attributes include:
- Object or Resource Attributes
- Subject Attributes
- Environment Attributes
- Most flexible access control model.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the concepts of Knowledge-Based Authentication (KBA) and security keys used in multi-factor authentication (MFA). Learn about secret questions, smart cards, tokens, and the latest technology like TOTP and HOTP. This quiz will enhance your understanding of user authentication methods.