something you know, something you have, something you are
authentication factors - proof of identity
false acceptance
system misidentifies an individual as an authorized user
measured by FAR
very serious
false rejection
system fails to recognize an authorized user
measured by FRR
less serious, effects availability
cross over error rate (CER)
efficacy rate that occurs when administrators tune the system to have equal FAR's and FRR's
multifactor authentication
A combination of two or more authentications a user must pass to access an information system, such as
a fingerprint scan combined with a password. (Something you know, something you are)
, Password Authentication Protocol (PAP)
The oldest and most basic form of authentication and also the least safe because it sends all passwords
in cleartext.
-requires the use of external encryption to protect passwords
performs one-way authentication. However, authentication is performed through a three-way handshake
(challenge, response, and acceptance messages) between a server and a client. The three-way
handshake allows a client to be authenticated and secure without sending credential information across
a network.
federated identity management (FIM)
When a user's identity is shared across multiple identity management systems.
-reduces the number of individual identities a user must have
single sign-on (SSO)
authentication systems that shares a single authentication session across multiple systems, avoiding
asking users to log in multiple times.
one-way trust
Domain 1 trusts Domain 2, but Domain 2 does not trust Domain 1
two-way trust
domain 1 and 2 trust each other
transitive trust
trust relationships transfer across domains without administrator creating trust
non-transitive trust
trust relationships do not transfer across domains unless administrator creates trust
RADIUS and TACACS
provide centralized approaches for authentication, authorization, and accounting
Remote Access Dial-In User Service (RADIUS)
An authentication framework that allows for centralized authentication functions for all network access
devices.
application server
a RADIUS client is usually an ____
uses unreliable User Datagram Protocol (UDP)
does not encrypt entire authentication sequence
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.