Information Technology /CompTIA Security+ (SY0-601): Authentication

CompTIA Security+ (SY0-601): Authentication

Information Technology25 CardsCreated about 2 months ago

This set of flashcards explores time- and event-based authentication mechanisms like TOTP and HOTP, along with advanced identity solutions such as context-aware authentication and Federated Identity Management (FidM), including both cross-certification and trusted third-party models for secure identity sharing.

TOTP

Time-Based One-Time Password:

A password is computed from a shared secret and current time

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/25

Key Terms

Term
Definition

TOTP

Time-Based One-Time Password:

A password is computed from a shared secret and current time<...

HOTP

HMAC-based One-Time Password:

A password is computed from a shared secret and is synchroniz...

Context-Aware Authentication

Process to check the user’s or system’s attributed or characteristics prior to allowing it to connect

Restrict authe...

FidM

Federated Identity Management:

A single identity is created for a user and shared with all ...

FidM: Cross-Certification

Utilizes a web of trust between organizations where each one certifies others in the federation

FidM: Trusted Third-Party

Organizations are able to place their trust in a single third-party (also called the bridge model)

Trusted third-par...

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

TOTP

Time-Based One-Time Password:

A password is computed from a shared secret and current time

HOTP

HMAC-based One-Time Password:

A password is computed from a shared secret and is synchronized between the client and the server

Context-Aware Authentication

Process to check the user’s or system’s attributed or characteristics prior to allowing it to connect

Restrict authentication based on the time of day or location

FidM

Federated Identity Management:

A single identity is created for a user and shared with all of the organizations in a federation

FidM: Cross-Certification

Utilizes a web of trust between organizations where each one certifies others in the federation

FidM: Trusted Third-Party

Organizations are able to place their trust in a single third-party (also called the bridge model)

Trusted third-party model is more efficient than a cross certification or web of trust mode

FidM: SAML

Security Assertion Markup Language:
Attestation model built upon XML used to share federated identity management information between systems

Open standard for authentication & authorization
Authenticate via third-party

FidM: OpenID

An open standard and decentralized protocol that is used to authenticate users in a federated identity management system

Used in conjunction with OAuth2

User logs into an Identity Provider (IdP) and uses their account at Relying Parties (RP)

OpenID is easier to implement than SAML
SAML is more efficient than OpenID

802.1x

Standardized framework used for port-based authentication on wired and wireless networks

Helps prevent rogue devices

(Ex: RADIUS, TACACS+)

EAP

Extensible Authentication Protocol:
A framework of protocols that allows for numerous methods of authentication including passwords, digital certificates, and public key infrastructure

EAP-MD5 uses simple passwords for its challenge-authentication

EAP-TLS uses digital certificates for mutual authentication

EAP-TTLS uses a server-side digital certificate and a client-side password for mutual authentication

EAP-FAST

Provides flexible authentication via secure tunneling (FAST) by using a protected access credential instead of a certificate for mutual authentication

PEAP & LEAP

Protected EAP:
Supports mutual authentication by using server certificates and Microsoft’s Active Directory to authenticate a client’s password

Lightweight EAP:
Proprietary to Cisco-based networks (supposedly FAST is an upgrade from LEAP)

LDAP

Lightweight Directory Access Protocol:
A database used to centralize information about clients and objects on the network

Unencrypted: Port 389
Encrypted: Port 636

Active Directory is Microsoft’s version

Kerberos

An authentication protocol used by Windows to provide for two-way (mutual) authentication using a system of tickets

Port 88

A domain controller can be a single point of failure for Kerberos

PAP

Password Authentication Protocol:
Used to provide authentication but is not considered secure since it transmits the login credentials unencrypted (in the clear)

CHAP

Challenge-Handshake Authentication Protocol:
Used to provide authentication by using the user’s password to encrypt a challenge string of random numbers

3-way handshake
After link, server sends challenge message
Client responds with password hash calculated from challenge & password
Server compares hash with stored hash
Occurs periodically

VPN Concentrator

Specialized hardware device that allows for hundreds of simultaneous VPN connections for remote workers


Split Tunneling

A remote worker’s machine diverts internal traffic over the VPN but external traffic over their own internet connection

Prevent split tunneling through proper configuration and network segmentation

RADIUS

Centralization administration system for dial-up, VPN, and wireless authentication that uses either ports 1812/1813 (UDP) or 1645/1646 (UDP)

Operates at layer 7

TACACS+

Cisco’s proprietary version of RADIUS that provides separate authentication and authorization functions over port 49 (TCP)


MitB

Man-in-the-Browser Attack:

Intercepts API calls between the browser process and its DLLs

Password Spraying

Brute force attack in which multiple user accounts are tested with a dictionary of common passwords


Credential Stuffing

Brute force attack in which stolen user account names and passwords are tested against multiple websites

Credential stuffing can be prevented by not reusing passwords across different websites

Broken Authentication

A software vulnerability where the authentication mechanism allows an attacker to gain entry

Weak password credentials
Weak password reset methods
Credential exposure
Session hijacking

OAuth

Authorization framework
Determines what resources a user can access
Created by Google/Twitter/others
Used with OpenID - handles the SSO authentication