Domain 2: Access Controls

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/153

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

154 Terms

1
New cards

Identity and Access Management (IAM)

The practice of managing user identities and controlling access to computer systems and resources.

2
New cards

Entity

A physical person, object, or group that requires access to an organization's systems or resources.

3
New cards

Identity

A representation of an entity within a system, often tied to roles such as employee, student, or administrator.

4
New cards

Attributes

Characteristics associated with an identity, such as job title, graduation year, or department.

5
New cards

Access Control

Mechanisms used to ensure that only authorized individuals or resources can access specific systems, data, or facilities.

6
New cards

Identification

The process where an individual makes a claim about their identity without providing proof.

7
New cards

Authentication

The step where an individual proves their identity to the access control system using credentials like passwords or biometric data.

8
New cards

Authorization

The process of verifying whether an authenticated user has the necessary permissions to access a resource.

9
New cards

AAA (Authentication, Authorization, and Accounting)

A security framework that ensures proper identification, access control, and activity tracking in an access control system.

10
New cards

Accounting

The process of tracking user activity and maintaining logs for auditing and security analysis.

11
New cards

Usernames

A common digital identification mechanism where individuals are assigned a unique identifier, often based on their name, for system access.

12
New cards

Access Cards

Physical identification tools issued by organizations to employees, often used for building access, authentication, or digital system access.

13
New cards

Magnetic Stripe Cards

Basic card-based identification systems that store data on a magnetic stripe, but are easily duplicated and not secure.

14
New cards

Smart Cards

Identification cards containing an integrated circuit chip that interacts with a reader to authenticate the card's validity.

15
New cards

Contact Smart Cards

Smart Cards that require direct insertion into a card reader for authentication.

16
New cards

Contactless Smart Cards

Also known as proximity cards, these cards use an antenna to communicate with a reader without physical contact.

17
New cards

Passive Cards

Contactless Smart Cards that require close proximity to a reader and are powered by the reader itself.

18
New cards

Active Cards

Contactless Smart Cards that contain a battery and can transmit data over longer distances, requiring periodic battery replacement.

19
New cards

Biometrics

A method of identifying and authenticating individuals based on physical characteristics, categorized as something you are.

20
New cards

Fingerprint Recognition

A biometric authentication method that scans and matches fingerprint patterns for identification and authentication.

21
New cards

Iris Scan

A biometric authentication technique that analyzes the color patterns of the iris.

22
New cards

Voiceprint Identification

A biometric authentication method that analyzes a user's voice pattern, susceptible to replay attacks.

23
New cards

Facial Recognition

A biometric system that scans and compares facial features to authenticate a user.

24
New cards

Hand Geometry

A biometric authentication method that measures and analyzes the shape and structure of a user's hand.

25
New cards

Vein Pattern Recognition

A biometric technique that examines the unique vein patterns in a user's hand for authentication.

26
New cards

Gait Analysis

A biometric method that identifies individuals based on their walking patterns.

27
New cards

Intrusiveness

The level of user discomfort or reluctance when using a biometric authentication system.

28
New cards

Registration

The process of gathering user information and creating an entity in the identity and access management system.

29
New cards

Identity Proofing

The verification process to ensure that an individual presenting themselves for registration is who they claim to be.

30
New cards

Requestor

The individual who initiates a request for the creation of a new entity in the system.

31
New cards

Approver

The individual responsible for reviewing and approving a registration request, ensuring it aligns with policy.

32
New cards

Registration Authority

A centralized role, often in human resources, responsible for performing identity proofing and other verification checks.

33
New cards

Issuer

The individual or entity responsible for issuing credentials after all verification steps have been completed.

34
New cards

Credential Issuance

The final step in the registration process, where an entity is provided with authentication credentials.

35
New cards

Photo Identification

Official government-issued identification documents, such as a passport or driver's license, used in identity proofing.

36
New cards

Fingerprinting

A biometric method used by some organizations and government agencies to verify identity against criminal or military records.

37
New cards

Background Check

A review of an individual's criminal, financial, or employment history to assess security risk before credential issuance.

38
New cards

Password Keys

Secret encryption keys used to manage access to a system.

39
New cards

False Acceptance Error

An authentication error where an unauthorized user is mistakenly granted access.

40
New cards

False Acceptance Rate (FAR)

The frequency at which false acceptance errors occur in an authentication system.

41
New cards

False Rejection Error

An authentication error where an authorized user is mistakenly denied access.

42
New cards

False Rejection Rate (FRR)

The frequency at which false rejection errors occur in an authentication system.

43
New cards

Crossover Error Rate (CER)

A measure of authentication system accuracy where the false acceptance and false rejection rates are equal.

44
New cards

Multifactor Authentication

An authentication approach that combines techniques from two or more different authentication factors, such as something you know and something you have.

45
New cards

Something You Know

An authentication factor based on knowledge, such as passwords or PINs.

46
New cards

Something You Have

An authentication factor requiring physical possession of a device, such as a smart card or smartphone.

47
New cards

Something You Are

An authentication factor based on biometric characteristics, such as fingerprints or facial recognition.

48
New cards

Soft Token

A software-based authentication method that generates one-time passwords (OTPs) on a smartphone app.

49
New cards

Physical Token

A hardware device, often carried on a keychain, that generates one-time passwords (OTPs) for authentication.

50
New cards

One-Time Password (OTP)

A temporary, single-use code generated for authentication, preventing reuse or replay attacks.

51
New cards

HMAC-Based One-Time Password (HOTP)

An OTP generation algorithm that uses a shared secret and an incrementing counter, producing a code that remains valid until used.

52
New cards

Time-Based One-Time Password (TOTP)

An OTP generation algorithm that uses the time of day and a shared secret, requiring synchronized clocks for proper function.

53
New cards

Smart Cards

A physical card with an embedded microchip used for authentication, often requiring insertion into a reader.

54
New cards

Common Access Card (CAC)

A smart card issued by the U.S. Department of Defense for authentication and access control.

55
New cards

Password Authentication Protocol (PAP)

An early authentication protocol that transmits usernames and passwords in plaintext, making it insecure for modern use.

56
New cards

Challenge Handshake Authentication Protocol (CHAP)

A secure authentication protocol that uses a challenge-response mechanism with cryptographic hashing to verify passwords without transmitting them over the network.

57
New cards

Challenge Value

A random value sent by the server to the client in CHAP authentication, used to generate a cryptographic hash.

58
New cards

Response

The hash value computed by the client in CHAP authentication, sent back to the server for verification.

59
New cards

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

A Microsoft-developed version of CHAP, later replaced by MS-CHAPv2.

60
New cards

MS-CHAPv2

An updated version of MS-CHAP, which has been found to be insecure and is not recommended for use.

61
New cards

Federated Identity Management

A system where multiple organizations agree to share identity information, reducing the number of individual identities a user must maintain.

62
New cards

Single Sign-On (SSO)

A system that allows users to authenticate once and gain access to multiple systems without re-entering credentials until the session expires.

63
New cards

Active Directory Federation Services (ADFS)

A Microsoft service that enables integration between Active Directory and other service providers, allowing for a federated single sign-on experience.

64
New cards

Shibboleth

An open-source single sign-on system designed for federated identity management, commonly used in higher education institutions.

65
New cards

One-Way Trust

A trust relationship where one domain trusts authenticated sessions from another, but the trust is not reciprocated.

66
New cards

Two-Way Trust

A trust relationship where both domains mutually trust each other's authenticated sessions.

67
New cards

Transitive Trust

A trust relationship where trust automatically extends across multiple domains, allowing indirect trust relationships.

68
New cards

Nontransitive Trust

A trust relationship that does not extend beyond explicitly defined domains, requiring administrators to manually establish additional trusts.

69
New cards

Network Border Firewall

A firewall that connects different security zones, controlling traffic between an organization's internal network, the internet, and other segments.

70
New cards

Internet Zone

The untrusted external network where inbound connections are generally restricted unless explicitly allowed by security policy.

71
New cards

Intranet Zone

The internal network where most organizational systems reside, often subdivided into segments for different business needs.

72
New cards

DMZ (Demilitarized Zone)

A network segment that hosts public-facing services such as web or mail servers, isolated to reduce risk if compromised.

73
New cards

Extranet

A dedicated network segment within an intranet that allows limited access for third-party vendors or business partners.

74
New cards

VPN (Virtual Private Network)

A secure communication tunnel that enables remote users or third parties to access an organization's network securely.

75
New cards

APIs (Application Programming Interfaces)

Interfaces that facilitate integration between software applications but require security measures such as authentication, authorization, input validation, and encryption to prevent exposure of sensitive data.

76
New cards

App Extensions

Additional software components that enhance application functionality but can introduce security risks if not properly secured.

77
New cards

Middleware

Software that enables communication between different systems and services, requiring strict access controls and regular security assessments to mitigate risks.

78
New cards

Third-Party Vendor Management

The process of assessing and monitoring external vendors to ensure their security practices align with organizational requirements.

79
New cards

Service-Level Agreements (SLAs)

Contracts that define security expectations and responsibilities, including specific security metrics and requirements for third-party service providers.

80
New cards

Zero Trust Network Architecture (ZTNA)

A security philosophy that eliminates trust based on network location, instead relying on strong authentication and authorization to verify user identities and grant access.

81
New cards

Security Information and Event Management (SIEM)

A system that collects and correlates log data from various security components to identify and analyze suspicious activity.

82
New cards

Security Orchestration, Automation, and Response (SOAR)

A platform that automates incident response using predefined playbooks to enable rapid reaction to security threats.

83
New cards

Cloud Access Security Broker (CASB)

A security solution that centralizes cloud security policy management, enforcing access controls and monitoring cloud service usage for unauthorized activity.

84
New cards

Endpoint Detection and Response (EDR)

A technology that monitors endpoints for potential compromises and automatically mitigates security threats to prevent unauthorized access.

85
New cards

Security Assertion Markup Language (SAML)

A protocol that enables browser-based single sign-on by allowing identity providers to authenticate users and pass security assertions to service providers.

86
New cards

Principal (SAML)

The end user who requests access to a web-based service in a SAML authentication process.

87
New cards

Identity Provider (IdP)

The organization that authenticates the user and provides proof of identity to the service provider.

88
New cards

Service Provider (SP)

The web-based service that relies on the identity provider to authenticate the user and grant access.

89
New cards

Security Assertion

A proof of identity issued by the identity provider, which the service provider validates before granting access.

90
New cards

OAuth

An authorization protocol that allows users to grant third-party applications access to their resources without sharing their credentials.

91
New cards

OpenID Connect (OIDC)

An authentication protocol that builds on OAuth to verify a user's identity and provide authentication services.

92
New cards

Digital Certificate

A digital credential used to authenticate users and devices by providing a trusted copy of a public key.

93
New cards

Public-Private Key Pair

A cryptographic key pair where the public key is shared for encryption and the private key is kept secret for decryption and authentication.

94
New cards

SSH (Secure Shell)

A protocol used for securely connecting to remote systems, often leveraging public-private key authentication.

95
New cards

PEM File

A file format that stores private keys, public keys, and certificates, commonly used in authentication.

96
New cards

Certificate-Based Authentication

A method of authentication that uses digital certificates signed by a trusted certificate authority to verify identity.

97
New cards

Certificate Authority (CA)

A trusted entity that issues and verifies digital certificates.

98
New cards

Personal Identity Verification (PIV) Card

A federal government-issued smart card that enables secure access to systems and facilities.

99
New cards

IEEE 802.1x

A network authentication standard that uses digital certificates for secure access control.

100
New cards

MAC-Based Authentication

A method that uses device MAC addresses for authentication, though it is insecure due to MAC address spoofing.