Network Security: Authentication and Access Control

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/111

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

112 Terms

1
New cards

What is the process of verifying an identity claimed by or for a system entity called?

Authentication.

2
New cards

What are the two steps involved in an authentication process?

Identification step and Verification step.

3
New cards

What does the identification step in user authentication involve?

Presenting an identifier to the security system.

4
New cards

What does the verification step in user authentication involve?

Presenting or generating authentication information that verifies the binding between the entity and the identifier.

5
New cards

What are the four means of user authentication?

1. Something the individual knows (e.g., password, PIN). 2. Something the individual possesses (e.g., cryptographic keys, smart cards). 3. Something the individual is (e.g., static biometrics like fingerprint). 4. Something the individual does (e.g., dynamic biometrics like voice pattern).

6
New cards

What is mutual authentication?

Protocols that enable communicating parties to verify each other's identity and exchange session keys.

7
New cards

What is a replay attack?

An attack where an opponent copies a message and replays it later.

8
New cards

What are the three types of replay attacks?

1. Simple replay of a message. 2. Replay of a timestamped message within a valid time window. 3. Backward replay without modification.

9
New cards

What is one approach to cope with replay attacks?

Attach a sequence number to each message used in an authentication exchange.

10
New cards

What is one-way authentication?

A process where the recipient wants assurance that a message is from the alleged sender.

11
New cards

What is the purpose of a key distribution center (KDC) in symmetric encryption?

To generate and distribute keys for secure communication between parties.

12
New cards

What is a suppress-replay attack?

An attack where a message is intercepted and replayed later when the timestamp becomes current.

13
New cards

What is Kerberos?

An authentication service developed as part of Project Athena at MIT.

<p>An authentication service developed as part of Project Athena at MIT.</p>
14
New cards

What are the requirements for Kerberos?

1. Secure. 2. Reliable. 3. Transparent. 4. Scalable.

15
New cards

What does Kerberos Version 4 use for authentication?

Data Encryption Standard (DES).

16
New cards

What is a ticket in Kerberos?

A data structure created by the authentication server that contains the user's ID and network address, encrypted with a shared secret key.

<p>A data structure created by the authentication server that contains the user's ID and network address, encrypted with a shared secret key.</p>
17
New cards

What is the role of the ticket-granting server (TGS) in Kerberos?

To issue tickets to users who have been authenticated by the authentication server.

18
New cards

What is a Kerberos realm?

A set of managed nodes that share the same Kerberos database.

19
New cards

What are the differences between Kerberos Version 4 and Version 5?

Version 5 addresses limitations in environmental shortcomings and technical deficiencies such as double encryption and session keys.

20
New cards

What is federated identity management?

A system that allows authorized users to access multiple applications and domains using a single set of credentials.

<p>A system that allows authorized users to access multiple applications and domains using a single set of credentials.</p>
21
New cards

What does the Denning protocol require for suppressing replay attacks?

Reliance on synchronized clocks throughout the network.

22
New cards

What is the challenge/response method in authentication?

A method where one party sends a nonce (challenge) to another party, which must respond with the correct nonce value.

23
New cards

What is the main risk associated with using timestamps in authentication?

Clocks can become unsynchronized, allowing for suppress-replay attacks.

24
New cards

What is the main function of Kerberos?

To provide centralized authentication for users to servers and servers to users.

25
New cards

What is the significance of a master key in the KDC?

It is shared between each party and the KDC to secure key distribution.

26
New cards

What is the purpose of federated identity solutions?

To link a user's identity across multiple identity management systems, allowing secure and efficient access to different applications without separate logins.

27
New cards

What types of applications can users access with federated identity solutions?

Web applications, partner websites, Active Directory, and other applications.

28
New cards

What is the basis of how federated identity works?

It operates on mutual trust relationships between a Service Provider (SP) and an Identity Provider (IdP).

29
New cards

What roles do the Service Provider (SP) and Identity Provider (IdP) play in federated identity?

The IdP creates and manages user credentials, while the SP and IdP agree on an authentication process.

30
New cards

Can multiple Service Providers participate in a federated identity agreement?

Yes, multiple SPs can participate in a federated identity agreement with a single IdP.

31
New cards

What is an example of federated identity in action?

Logging into a third-party website using Gmail login credentials.

32
New cards

What is required for the IdP and SP to function in a federated identity system?

Mutual trust agreements between the IdP and the SP.

33
New cards

What is the benefit of Federated Identity regarding user access?

Users do not have to create new credentials to access multiple websites with a federated agreement, such as YouTube, Fitbit, Waze, and Picasa.

34
New cards

What are some key standards associated with Federated Identity?

Key standards include SAML (Security Assertion Markup Language), SOAP (Simple Object Access Protocol), and WS-Security.

35
New cards

What is SAML?

SAML is an XML-based markup language that enables the exchange of security information between online business partners.

36
New cards

What are the benefits of Federated Identity?

Benefits include enhanced security, enhanced user experience, single-point provisioning, secure resource-sharing, and cost savings.

37
New cards

What is Personal Identity Verification (PIV)?

PIV is a user authentication method based on the possession of a smart card, which resembles a credit card and has an electronic interface.

<p>PIV is a user authentication method based on the possession of a smart card, which resembles a credit card and has an electronic interface.</p>
38
New cards

What types of memory does a smart card contain?

A smart card includes Read-only memory (ROM), Electronically erasable programmable ROM (EEPROM), and Random access memory (RAM).

39
New cards

What is the purpose of the Personal Identification Number (PIN) in PIV?

The PIN is required to activate the card for privileged operations.

40
New cards

What is the Cardholder Unique Identifier (CHUID)?

The CHUID includes the Federal Agency Smart Credential Number (FASC-N) and the Global Unique Identification Number (GUID), uniquely identifying the card and cardholder.

41
New cards

What is the function of the PIV Authentication Key?

The PIV Authentication Key is an asymmetric key pair and corresponding certificate used for user authentication.

<p>The PIV Authentication Key is an asymmetric key pair and corresponding certificate used for user authentication.</p>
42
New cards

What is the role of the Card Authentication Key in PIV?

The Card Authentication Key is used to authenticate the cardholder by matching fingerprint samples to the signed biometric data element.

43
New cards

What is the BIO authentication mechanism?

BIO uses electronic credentials on a PIV card to authenticate the cardholder by matching fingerprint samples with signed biometric data, requiring the PIN for activation.

44
New cards

What is the difference between BIO and BIO-A authentication mechanisms?

BIO requires the PIN for activation, while BIO does not require the PIN and is used in environments where a low level of assurance is acceptable.

45
New cards

What does the PKI authentication mechanism involve?

PKI authentication uses the Card Authentication Key in a challenge-response protocol, allowing contact or contactless authentication without the holder's active participation.

46
New cards

What is the purpose of the Digital Signature Key in PIV?

The Digital Signature Key is an asymmetric key pair and certificate that supports document signing and signing of data elements.

47
New cards

What is the significance of biometric authentication in PIV?

Biometric authentication enhances security by using unique biological traits, such as fingerprints or iris images, to verify the identity of the cardholder.

48
New cards

What is the Asymmetric Card Authentication Key?

The Asymmetric Card Authentication Key is used for card authentication and involves an asymmetric key pair and corresponding certificate.

49
New cards

How does the PIV card support biometric authentication?

The PIV card supports biometric authentication through fingerprint templates, electronic facial images, and iris images.

50
New cards

What is the function of the Key Management Key in PIV?

The Key Management Key supports key establishment and transport using an asymmetric key pair and corresponding certificate.

51
New cards

What is the significance of the Random Access Memory (RAM) in a smart card?

RAM holds temporary data generated when applications on the smart card are executed.

52
New cards

What does the term 'secure resource-sharing' refer to in the context of Federated Identity?

Secure resource-sharing refers to the ability to share resources securely among multiple online business partners through federated identity systems.

53
New cards

What is the purpose of the Electronic facial image in PIV?

The Electronic facial image is used for biometric authentication to verify the identity of the cardholder.

54
New cards

What does the term 'message integrity' mean in the context of web services?

Message integrity ensures that the data exchanged between web services remains unchanged and authentic during transmission.

55
New cards

What is the role of the PIV Card Application Administration Key?

The PIV Card Application Administration Key is a symmetric key associated with the card used for managing biometric authentication.

56
New cards

What is the focus of Lecture 4 in CCS6224?

Securing the Local Area Network.

57
New cards

What are the main components of Endpoint Security?

Host-Based protection, Antivirus/Antimalware, SPAM Filtering, URL Filtering, Blacklisting, Data Loss Prevention (DLP).

<p>Host-Based protection, Antivirus/Antimalware, SPAM Filtering, URL Filtering, Blacklisting, Data Loss Prevention (DLP).</p>
58
New cards

What is a CAM Table Attack?

An attack where an intruder fills the CAM table of a switch, causing it to flood all traffic to all ports.

59
New cards

What is the result of a successful CAM Table Attack?

The switch floods all traffic, allowing the attacker to capture sensitive data.

60
New cards

What are some mitigation strategies for Layer 2 Security Threats?

Mitigation strategies include monitoring and limiting access to the CAM table, implementing VLANs, and using DHCP snooping.

61
New cards

What services does Data Loss Prevention (DLP) provide?

DLP provides detailed logging, user/administrator notifications, real-time prevention and blocking, and quarantine of confidential data.

62
New cards

What is the purpose of SPAM Filtering in Endpoint Security?

To identify and block unwanted or malicious email communications.

<p>To identify and block unwanted or malicious email communications.</p>
63
New cards

How does URL Filtering contribute to Endpoint Security?

It restricts access to harmful or inappropriate websites.

64
New cards

What is the role of Blacklisting in network security?

To block known malicious IP addresses or domains from accessing the network.

65
New cards

What are the questions to consider after a malware attack?

Where did it come from? What was the threat method and point of entry? What systems were affected? What did the threat do? Can I stop the threat and root cause? How do we recover from it? How do we prevent it from happening again?

66
New cards

What is the function of Cisco Network Access Control (NAC)?

To enforce security policies on devices attempting to access the network.

<p>To enforce security policies on devices attempting to access the network.</p>
67
New cards

What happens during a DHCP Attack?

An attacker can respond to DHCP requests with malicious IP addresses, leading to man-in-the-middle attacks.

68
New cards

What is the purpose of VLAN Attack mitigation?

To prevent unauthorized access to VLANs and protect against VLAN hopping.

69
New cards

What is the significance of logging in Data Loss Prevention?

It provides forensic evidence for security incidents and helps in compliance.

70
New cards

What is a common tool used in CAM Table Attacks?

Attack tools that can fill the CAM table, causing traffic flooding.

71
New cards

What is a countermeasure for CAM Table Attacks?

Port Security

72
New cards

What are the steps to enable Port Security?

1. Enable Port Security 2. Set maximum number of MAC addresses 3. Configure MAC addresses manually or dynamically.

73
New cards

What are the security violation modes in Port Security?

1. Protect 2. Restrict 3. Shutdown

74
New cards

What is the purpose of Port Security Aging?

To remove inactive MAC addresses from the MAC address table after a specified time.

75
New cards

How does Port Security work with IP Phones?

Port Security can limit the number of MAC addresses to prevent unauthorized devices from connecting.

76
New cards

What is a VLAN Hopping Attack?

An attack where an end station can spoof as a switch to gain access to all VLANs.

77
New cards

What is the default behavior of trunk ports in VLANs?

Trunk ports have access to all VLANs by default.

78
New cards

What encapsulation methods can be used in VLAN Hopping Attacks?

802.1q or ISL.

79
New cards

What is a Double-Tagging VLAN Hopping Attack?

An attack where an attacker sends frames with two VLAN tags to gain access to multiple VLANs.

80
New cards

What is the best way to mitigate VLAN Hopping Attacks?

Ensure the native VLAN of the trunk port is different from any user ports.

81
New cards

What should not be used for any VLAN configuration?

VLAN1.

82
New cards

What is the function of a DHCP server?

Dynamically assigns IP addresses on demand and provides configuration information.

83
New cards

What is a DHCP Starvation Attack?

A Denial of Service attack where an attacker leases all available DHCP addresses.

84
New cards

How does a Gobbler perform a DHCP Starvation Attack?

It uses a new MAC address to request multiple DHCP leases.

85
New cards

What is a method to mitigate DHCP Starvation Attacks?

Restrict the number of MAC addresses allowed on a port.

86
New cards

What happens when a rogue DHCP server is present?

It can provide incorrect IP configuration information to clients.

87
New cards

What is the potential problem with incorrect information from a rogue DHCP server?

Clients may receive incorrect IP addresses or configurations, leading to network issues.

88
New cards

What is the role of DHCP options?

To deliver additional configuration information along with the IP address.

89
New cards

What is the process of DHCP address assignment?

1. DHCP Discovery (Broadcast) 2. DHCP Offer (Unicast) 3. DHCP Request (Broadcast) 4. DHCP Ack (Unicast).

90
New cards

What is the impact of a rogue DHCP server on network security?

It can redirect traffic, perform man-in-the-middle attacks, or disrupt network services.

91
New cards

What is the significance of lease time in DHCP?

It determines how long an IP address is assigned to a client before it must be renewed.

92
New cards

What happens when there is a wrong default gateway in a network?

The attacker becomes the gateway.

93
New cards

What is the consequence of a wrong DNS server configuration?

The attacker becomes the DNS server.

94
New cards

How can an attacker exploit a wrong IP address in a network?

The attacker can perform a Denial of Service (DOS) attack using an incorrect IP.

95
New cards

What is DHCP Snooping?

A security feature that helps mitigate rogue DHCP server attacks by validating DHCP messages.

96
New cards

What is the purpose of configuring a maximum number of MAC addresses in DHCP Snooping?

To limit the number of devices that can connect to a network segment, enhancing security.

97
New cards

What is the process for verifying DHCP Snooping?

It involves checking the DHCP snooping database and ensuring that only valid DHCP messages are processed.

98
New cards

What is the function of ARP in networking?

ARP (Address Resolution Protocol) maps an IP address to a MAC address.

99
New cards

What is ARP Spoofing?

An attack where an attacker sends false ARP messages to associate their MAC address with the IP address of another device.

100
New cards

How does Dynamic ARP Inspection mitigate ARP attacks?

It uses the DHCP snooping binding table to validate ARP requests and replies.