• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
Authentication
“Authentication is the process of determining whether information is trustworthy and genuine.”
3 general methods to authenticate
Something you know
Something you have
Something about you/that you are
What is the most common technique for Authentication
userids/password combination
Three Reasons Default accounts are left active
1. The admin is not aware they exist or doesn’t know how to disable them.
2. The admin wants a “failsafe” mechanism (in case the vendor needs to access the system should a major problem occur)
3. The admin wants to make sure that he/she doesn’t get locked out
Name a few rules for passwords
Don’t pick an easy one to guess
mix upper and lower case, add special characters and numbers
at least 6 characters in length, 8 better, 10 even better
maybe use pass-phrases instead of dictionary words
Don’t write it down
Don’t reuse previous passwords (or just add a # to it)
Change it on a regular basis (but not too often), 45 days.
If you’re the sysadmin, run a password cracker periodically.
If one-time passwords are possible, consider using them (they have their own problems though)
Name some password management issues
Default accounts
Easily guessed or cracked passwords
Unpassworded accounts
Shared accounts
Password aging
Password policy enforcement
Password auditing
What are the 3 basic Authentication Techniques
1. Something you know
2. Something you have
3. Something about you
Problems with the 3 basic Authentication Techniques
- Something you know:
*people write things down, they *choose poorly

- Something you have
*requires additional hardware ($)
*people lose them

- Something about you
*requires additional hardware ($$)
*things about you can change
something you have includes
*May combine a method below with a userid/password
*Physical keys
*Magnetic cards
*Smart cards
* "calculators” device that looks like (and may even function as) a calculator.
Something about you includes
Biometrics

Voice prints

Fingerprint

Retinal Scan

Hand Geometry

Signature analysis
“Access controls serve to enforce
“Access controls serve to enforce an authorization policy, which specifies what activity is allowed and who is allowed to initiate it.”
T/F: access controls can apply to any media – print, tapes, networks, memory, . . .
True
NT Access Control Lists (ACL) Consists of
- Owner SID: The owner’s security ID
- Group SID: The security ID fo the primary group.
- Discretionary Access Control List (DACL): specifies who has what access to the object.
- System Access Control List (SACL): Specifies which operations by which users should be logged in the security audit log.