L16: IAM - Authentication and Authorization

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Identity and Access Management (IAM)

Manage digital identities and access rights across an organization

2
New cards

core components of IAM

  • Authentication

  • Authorization

  • ID governance and lifecycle management

  • Privileged account management

3
New cards

authentication

verifying users’ claimed identities

4
New cards

factors of authentication

  • something you know (password)

  • something you have (token, smart card)

  • something you are (biometrics)

5
New cards

entropy

measure of password unpredictability

6
New cards

what increases entropy?

a longer password with varied character types

7
New cards

common password attacks

  • brute-froce

  • rainbow table

  • credential stuffing

8
New cards

rainbow table attack

uses a precomputed table of password hashes to quickly find the corresponding plaintext passwords

9
New cards

credential stuffing

automatic injection of stolen usernames and passwords in hopes that one works

10
New cards

mitigation of password attacks

  • store passwords securely

  • strong cryptographic hashing algorithms

  • use Password-Authenticated Key Exchanges (PAKEs)

11
New cards

how to store passwords securely

  • hash passwords

  • use salts

12
New cards

recommended hashing algorithms

argon2, bcrypt, scrypt, pbkdf2

13
New cards

examples of biometrics

facial recognition, iris scans

14
New cards

strengths of biometrics

difficult to replace, user-friendly

15
New cards

risks of biometrics

  • false positives/negative

  • irrevocability if compromised

16
New cards

multi-factor authentication (MFA)

use 2+ different authentication factorsad

17
New cards

advantages of MFA

  • reduces risks from password theft

  • highly effective in preventing unauthorized access

18
New cards

challenges of MFA

  • user inconvenience

  • implementation complexity

19
New cards

role based access control (RBAC)

access right assigned based on predefined roles

20
New cards

advantages of RBAC

  • efficient

  • manageable

  • reduce errors

21
New cards

limitations of RBAC

less flexible when handling specific exceptions

22
New cards

attribute based access control (ABAC)

use dynamic policies based on attributes

23
New cards

advantages of ABAC

  • flexible

  • granular control

24
New cards

challenges of ABAC

  • difficulty of initial policy setup

  • complex to manage