Identity and AAA
identity
factors
identity management
directories
standards
x500
namespaces
metadata directory
virtual directory
web access management
cookies
password management
password synch
self service pwd reset
assisted pwd reset
legacy SSO
spof/bottleneck
account management
provisioning
ASOR
profile update
federation
portals
markup languages
xml
spml
saml
soa
xacml
authentication
biometrics
ratings
CER/ERR
Type I FRR
Type II FAR
behavioural
signature dynamics
keystroke
gait
voice
physological
fingerprints
palmscan
iris
retina
hand topography
hand geometry
facial scan
passwords
attacks
electronic monitoring
access pwd file
brute force attacks
dictionary attacks
social engineering attacks
rainbow table
protection
hashing/encryption
pwd aging
pwd checkers
limit logon attempts
one time password
token
synch
async
nonce challenge
cryptokeys
cards
memory
smart
contact
contactless
attacks
rfid
passphrases
authorisation
Access criteria
role,groups,location,time,transaction
default no access
need to know
authorisation creep
SSO
Kerberos
weakness
sym key
Sesame
timestamps
kryptoknight
SPOF for KDC
Security domains
thin clients
Accountability
auditing
thresholds
tools
SIEM
Access Control Models
DAC
ID Based
MAC
Sensitivity Label
classification
categories
multilevel security(mls)
NDAC
rulebased
rolebased
core RBAC
hierarchical
static sep.of.dut
dyn spe.of.dut
Techniques
Rule-based
CUI
from clark wilson
shell
AC Matrix
capability table
ACLs
Content dependent AC
nbar
Context dependent AC
Administration
Centralised
Radius
Tacacs
Diameter
Decentralised
Controls
Administrative Controls
Technical Controls
Physical Controls
Security Controls
preventive
detective
corrective
deterrent
recovery
compensating
Monitoring and Practices
Practices
IDS
host-based
network based
engines
knowledge/signature
statistical/anomaly
protocol
traffic
rule-based
IPS
Honeypots
threat modelling
Threats
Authorisation disclosure
object reuse
emanations
accountability
scrubbing
keystroke monitoring
dictionary attacks
brute force attacks
phishing and pharming
spoofing at logon
Identity Theft