Page 5 - Security+ (635 notes by Nikkhah)
P. 5

39- Tokens use a variety of authentication methods such as one-time password, single sign-
            on, or two-factor.




            Multifactor authentication
            40- Multifactor authentication uses two or more factors to identify a person:

            — Asomething you know factor, such as your password or PIN.

            — Asomething you have factor, such as your hardware token or a smart card.
            — Asomething you are factor, such as your fingerprints, your eye retina, or other biometrics

            that can be used for identity.
            — A something you do factor, such as your handwriting or your voice patterns.



            Mutual authentication

            41- Mutual authentication is used to verify the identity of both ends of communication.

            42- This method prevents Man-In-The-Middle Attacks (MITM).
            43- Most networkoperating systems provide mechanisms for mutual authentication.



            Biometrics

            44- Biometrics is used to authenticate a person using physical and behavioral characteristics.
            45- Advanced biometric devices help identify a person using fingerprints, handwriting, voice

            patterns, or eye retina scans.

            46- This is the most trusted method of authentication.



            Auditing and logging

            47- Auditing  helps  trackthe  activities  of  users  and  system  processes  and  helps save  audit
            entries in log files.

            48- Auditing is a two-step process: enabling auditing on resources and viewing audit log files.
            49- It can help troubleshoot and diagnose system and network problems.

            50- It can help track internal and external security breaches.
            51- System auditing helps trackauthorized and unauthorized access of system resources and

            processes.

            52- Unauthorized  activities  include  attempts  to  access  classified  information, concealment,
            conversion, and copying of confidential data.

            53- Log files must not be accessible to unauthorized users.


                   www.hrnikkhah.com                        by :  Hamid  Reza  Nikkhah                 Page 3
   1   2   3   4   5   6   7   8   9   10