A | B |
Access control | combines authentication and authorization |
authentication | proves users idenity |
authorization | granting users access |
CIA elements | confidentiality, integrity,availability |
share-based access control | same as password-based control |
access based on user identity | user- based identity |
depends on workstation being used | location based identity |
Interoperability | ability of objects to interact with each other |
authenticity | determines trustworthiness |
synergistic | single control manages many objects |
Discretionary control (DAC) | uses ACLs to define access |
Mandatory access Control (MAC) | uses sensitivity labels and need to know |
Role-based (RBAC) | uses work task list |
Kerberos | authentication mechanism that encrypts logon credentials |
Internet Protocol Security (IPSec) | used to encrypt transmissions, sessions and network traffic |
Single-factor authentication | weakest form of authentication |
Tojan horse,key loggers, shoulder surfing | can capture passwords |
impersonation | logging on with someone elses password |
easy to remember, difficult to guess | good password |
biggest drawback in strong passwords | users write down password |
enrollment | required for biometric authorization |
Crossover rate | measure of reliability using rate of false rejections and acceptace |
acceptance | how users feel about biometric device |
capability | ability of users to use device |
token | device issued to user for login |
drawback of tokens | difficult to deploy and expensive, may run out of battery |
drawback of biometrics | may not be acceptable to users, can be spoofed by photo, gelatin, etc. |
drawback of passwords | impersonation |
strongest authentication | use of more than one factor |
ticket granting | gives users use (Kerberos) |
Key Distribution | authentication (Kerberos) |
RADIUS | allows users to authenticate to remote servres |
Realm | organization boundry |
RTGS | grants tickets for remote realms |
CHAP | protocol that authenticates remote clients or routers, periodic reauthorization |
MD5 | hash function |