IAM Solutions & Vulnerabilities and Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/319

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

320 Terms

1
New cards

What is Identity and Access Management (IAM)?

A security framework ensuring the right individuals have access to the right resources at the right time.

2
New cards

What are the four core processes of IAM?

Identification, Authentication, Authorization, Accounting (Auditing)

3
New cards

What is identification in IAM?

The process where a user claims an identity, typically using a username or email.

4
New cards

Why is identification important in IAM?

It ensures the legitimacy of users, such as matching billing and delivery addresses in e-commerce.

5
New cards

What is authentication in IAM?

Verifying a user's identity by validating credentials (e.g., passwords, biometrics, MFA).

6
New cards

What does authorization determine?

A user’s permissions and access levels after authentication.

7
New cards

How does authorization work in an organization?

HR employees access personnel files, while finance employees access financial data.

8
New cards

What is accounting (auditing) in IAM?

Tracking and recording user activities to detect incidents, vulnerabilities, and provide breach evidence.

9
New cards

What is provisioning in IAM?

Creating new user accounts and assigning permissions (e.g., onboarding employees).

10
New cards

What is deprovisioning in IAM?

Removing access rights when no longer needed, preventing unauthorized access.

11
New cards

What is identity proofing?

Verifying a user’s identity before account creation using trusted sources or ID verification.

12
New cards

What is interoperability in IAM?

The ability for different systems to share authentication and authorization data.

13
New cards

What standards enable IAM interoperability?

SAML (Security Assertion Markup Language) and OpenID Connect.

14
New cards

What is attestation in IAM?

Validating that user accounts and access rights are correct and up-to-date.

15
New cards

Why is attestation necessary?

It ensures users have minimal necessary access, preventing excessive privileges.

16
New cards

Why is IAM crucial for enterprise security?

It manages risks related to processing, storage, and transmission of information.

17
New cards

What additional IAM concepts enhance security?

Provisioning, Identity Proofing, Interoperability, Attestation.

18
New cards

What is Multifactor Authentication (MFA)?

A security system that requires more than one authentication method from independent credential categories to verify a user’s identity.

19
New cards

What is the main goal of MFA?

To create a layered defense against unauthorized access to devices, networks, and databases.

20
New cards

What are the five categories of authentication factors in MFA?

- Something You Know (Knowledge-Based)

- Something You Have (Possession-Based)

- Something You Are (Inherence-Based)

- Somewhere You Are (Location-Based)

- Something You Do (Behavior-Based)

21
New cards

What is an example of a Knowledge-Based authentication factor?

Passwords, PINs, security questions (e.g., unlocking a device with a PIN).

22
New cards

What is an example of a Possession-Based authentication factor?

Smart cards, hardware tokens (e.g., using a smart card and PIN to access a laptop).

23
New cards

What is the difference between hardware and software tokens?

- Hardware tokens → Generate unique authentication codes.

- Software tokens → Apps like Google Authenticator create time-based codes.

24
New cards

What is an example of an Inherence-Based authentication factor?

Biometrics, such as fingerprints and facial recognition (e.g., Face ID).

25
New cards

How does location affect authentication?

MFA can restrict access to users within a specific geographic area using IP address or GPS.

26
New cards

What does a Behavior-Based authentication factor analyze?

User behavior patterns, such as keystroke dynamics and mouse movements.

27
New cards

What are the three types of authentication methods?

- Single-Factor Authentication → Uses only one method (e.g., password).

- Two-Factor Authentication (2FA) → Uses two different factors (e.g., password + smartphone code).

- Multifactor Authentication (MFA) → Uses two or more factors for verification.

28
New cards

How does MFA improve security?

It reduces the risk of unauthorized access, protecting against phishing and data breaches.

29
New cards

Why is password management important?

Weak passwords can compromise security; password managers help create and store strong passwords.

30
New cards

What are passkeys in authentication?

A newer passwordless authentication method, secured by device locks (e.g., biometrics).

31
New cards

Why are passkeys more secure than passwords?

They eliminate the need for remembering passwords and use device-based security.

32
New cards

How do passkeys use public key cryptography?

The private key is stored on the user’s device, while the public key is on the server, preventing exposure of sensitive information.

33
New cards

Why is MFA essential for security?

It provides stronger authentication than single-factor methods, helping protect information systems.

34
New cards

What is password security?

Measures the effectiveness of a password against guessing and brute-force attacks to ensure only authorized users access systems.

35
New cards

What tools are used to create password policies?

Group Policy Editor (local machines) and Global Policy Orchestrator (domain environments).

36
New cards

What are the five key considerations when creating password policies?

- Password Length

- Password Complexity

- Password Reuse

- Password Expiration

- Password Age

37
New cards

Why is password length important?

Longer passwords are harder to crack; recommended length is 12-16 characters.

38
New cards

How does password length affect security?

A 7-character password can be cracked in seconds, while a 20-character password may take months.

39
New cards

What makes a password complex?

Mixing uppercase and lowercase letters, numbers, and special characters.

40
New cards

Why is a password with symbols, numbers, and letters more secure?

It increases the number of possible combinations, making it harder to guess.

41
New cards

Why should passwords not be reused?

Reusing passwords across multiple accounts increases the risk of compromised access.

42
New cards

How do organizations prevent password reuse?

By implementing password history policies so users cannot quickly revert to old passwords.

43
New cards

What is password expiration?

Forcing users to change passwords after a set time (e.g., every 90 days).

44
New cards

What does NIST recommend about password expiration policies?

Reconsidering expiration rules unless a password manager is used.

45
New cards

What is password age in security?

How long a password has been in use before requiring a change.

46
New cards

Why set a minimum password age?

Prevents users from quickly cycling back to familiar passwords.

47
New cards

What are password managers used for?

Secure storage and management of passwords.

48
New cards

Name four key features of password managers.

- Password Generation – Creates strong, unique passwords.

- Autofill – Automatically fills in login credentials.

- Secure Sharing – Allows password sharing without revealing actual credentials.

- Cross-Platform Access – Available on multiple devices.

49
New cards

What is passwordless authentication?

A method that eliminates traditional passwords by using biometrics or hardware tokens.

50
New cards

What are passkeys?

Securely stored credentials that rely on device security features for authentication.

51
New cards

How do passkeys use public key cryptography?

The private key is stored on the user’s device, while the public key is on the server.

52
New cards

What are the five types of authentication factors?

- Something You Know – Passwords or PINs.

- Something You Have – Physical devices like tokens or smartphones.

- Something You Are – Biometric data (fingerprints, facial recognition).

- Something You Do – Behavioral patterns (keystroke dynamics).

- Somewhere You Are – Location-based verification (IP/GPS).

53
New cards

Why are strong password policies essential?

They help protect organizational data by minimizing risk from breaches.

54
New cards

What two methods improve password security beyond strong policies?

Multifactor authentication (MFA) and password management tools.

55
New cards

What are password attacks?

Methods used by attackers to crack or recover passwords.

56
New cards

What are four types of password attacks?

- Brute Force Attacks

- Dictionary Attacks

- Password Spraying

- Hybrid Attacks

57
New cards

How does a brute force attack work?

Tries every possible combination of characters until the correct password is foun

58
New cards

How long does it take to crack a 4-digit PIN with a brute force attack?

About a minute, since there are only 10,000 possible combinations.

59
New cards

What does a dictionary attack use?

A list of commonly used passwords to guess the correct one.

60
New cards

How have dictionary attacks changed over time?

They now use hacker dictionaries with variations (e.g., "password" → "P@ssw0rd").

61
New cards

What makes password spraying different from brute force attacks?

Tries a small number of common passwords across many accounts to avoid lockouts.

62
New cards

How does a hybrid attack work?

Combines brute force and dictionary attacks, starting with common passwords and adding variations.

63
New cards

What are four strategies to mitigate password attacks?

- Increase Password Complexity → Use letters, numbers, and special characters.

- Increase Password Length → Longer passwords take more time to crack.

- Limit Login Attempts → Prevents repeated guesses.

64
New cards

Why use password managers?

They create and store strong, unique passwords to prevent reuse and simplify management.

65
New cards

What is "John the Ripper"?

A popular password cracking tool used to identify weak passwords.

66
New cards

How does John the Ripper demonstrate password attacks?

It can create an MD5 hash and quickly crack weak passwords.

67
New cards

Why is understanding password attacks crucial?

It helps implement effective security measures.

68
New cards

What three security enhancements should organizations adopt?

- Strong password policies

- Password managers

- Enabling MFA

69
New cards

What is Single Sign-On (SSO)?

An authentication process allowing users to access multiple applications or websites with a single set of credentials.

70
New cards

Why is SSO beneficial for users?

It simplifies user experience and enhances productivity by reducing the need to remember multiple passwords

71
New cards

What is the foundation of SSO authentication?

A trusted relationship between an application and an Identity Provider (IdP).

72
New cards

What does the Identity Provider (IdP) do?

Manages identity information and provides authentication services to network applications.

73
New cards

What are the three main steps in SSO authentication?

- User logs into the primary IdP (e.g., Windows domain controller).

- Secondary application requests verification from the IdP.

- IdP confirms the user's identity, granting access without re-entering credentials.

74
New cards

What are four key benefits of using SSO?

- Improved User Experience – Users remember only one set of credentials.

- Increased Productivity – Saves time by eliminating multiple logins.

- Reduced IT Support Costs – Fewer password reset requests.

- Enhanced Security – Encourages stronger passwords and reduces reuse.

75
New cards

What are three protocols used for SSO?

- LDAP (Lightweight Directory Access Protocol)

- OAuth (Token-Based Authentication)

- SAML (Security Assertion Markup Language)

76
New cards

What is LDAP used for in SSO?

Accessing and maintaining directory services over an IP network.

77
New cards

How does LDAP support SSO?

It shares user credentials across multiple services, enabling seamless authentication.

78
New cards

What is OAuth?

An open standard for token-based authentication and authorization.

79
New cards

How does OAuth improve authentication security?

Users log into third-party services without sharing passwords, relying on authorization tokens.

80
New cards

What does the OAuth authorization server do?

Processes authorization requests and issues access tokens.

81
New cards

What does SAML do in SSO authentication?

Allows users to log into applications based on existing session authentication.

82
New cards

How does SAML verify a user’s identity?

It redirects users to the IdP for authentication, then confirms their identity to the service provider.

83
New cards

Why is SSO essential for usability and security?

It allows users to authenticate once and access multiple services, improving efficiency and protection.

84
New cards

Why is understanding protocols like LDAP, OAuth, and SAML important?

They are essential for implementing effective SSO solutions

85
New cards

What is Federation in Identity and Access Management (IAM)?

Federation allows linking of electronic identities across multiple identity management systems, enabling users to log into various systems with the same credentials.

86
New cards

What is Federation based on?

Trusted relationships between different systems.

87
New cards

What does an Identity Provider (IdP) do in a federated system?

Verifies user identity and provides authentication services to the system.

88
New cards

What are two major benefits of Federation for organizations?

- Extends access beyond an organization’s network (includes partners, suppliers, and customers).

- Simplifies account management by allowing external authentication without creating new accounts.

89
New cards

What are the six steps in a federation login process?

- Login Initiation – User accesses a service and chooses to log in.

- Redirection to IdP – Service provider redirects the user to the IdP.

- User Authentication – User enters credentials, which the IdP validates.

- Generation of Assertion – IdP creates a token with identity details.

- Return to Service Provider – User is redirected back with the assertion.

- Verification and Access – Service provider validates the assertion and grants access.

90
New cards

What are three key benefits of Federation?

- Simplified User Experience – Users remember only one set of credentials for multiple services.

- Reduced Administrative Overhead – Organizations don’t need to manage individual accounts for external users.

- Increased Security – Reduces password reuse risks and ensures secure authentication

91
New cards

What protocols are commonly used for Federation?

SAML, OAuth, and OpenID Connect for authentication and authorization.

92
New cards

How does SAML support Federation?

Redirects users to an IdP for authentication and confirms identity to the service provider.

93
New cards

What does OAuth do in a federated system?

Provides token-based authentication, allowing users to log in without sharing passwords.

94
New cards

How does OpenID Connect enhance Federation?

Adds user authentication on top of OAuth, making SSO implementation easier.

95
New cards

What are the key advantages of Federation in IAM?

- Enhances user convenience and security.

- Reduces IT costs while improving overall security.

96
New cards

What is Privileged Access Management (PAM)?

A security solution designed to restrict and monitor privileged accounts within an IT environment.

97
New cards

Why is PAM important for organizations?

It prevents the malicious abuse of privileged accounts and mitigates risks from weak privilege configuration.

98
New cards

How does PAM help prevent data breaches?

By enforcing the principle of least privilege, ensuring users only have necessary access for their roles.

99
New cards

What are the three main components of PAM?

- Just-in-Time (JIT) Permissions

- Password Vaulting

- Temporal Accounts

100
New cards

What is the concept of JIT Permissions?

A security model where administrative access is granted only when needed and for a limited duration.