14-C Flashcards
(50 cards)
What do logical access controls ensure?
Each user is identified and authenticated before being allowed to use a host or network services.
What is a security control?
A safeguard or prevention method to avoid, counteract, or minimize risks relating to personal or company property.
Name the three types of security controls.
- Physical controls
- Procedural controls
- Logical controls
What are physical controls?
Controls that work in the built environment to control access to sites. Examples include fences, doors, and locks.
What are procedural controls?
Controls applied and enforced by people. Examples include incident response processes, management oversight, and security awareness training programs.
What are logical controls?
Controls applied and enforced by digital or cyber systems and software. Examples include user authentication, antivirus software, and firewalls.
What does the AAA triad stand for?
- Authentication
- Authorization
- Accounting
Define authentication in the context of access control.
The process of identifying an account and ensuring that it can only be operated by someone who can supply the correct credentials.
What is authorization?
Access to resources is allowed only to accounts with defined permissions.
What does accounting refer to in an access control system?
Logging when and by whom a resource was accessed.
What is a permission in security settings?
A security setting that determines the level of access an account has to a particular resource.
What is an access control list (ACL)?
A list attached to each resource that specifies the permissions for each subject.
What does implicit deny mean?
Unless there is a rule specifying that access should be granted, any request for access is denied.
What is the principle of least privilege?
A user should be granted the minimum possible rights necessary to perform their job.
What is a local account in Windows?
An account defined on a specific computer only, stored in the Security Account Manager (SAM).
What is a Microsoft account?
An account managed via an online portal, identified by an email address, and can synchronize profile settings between devices.
What is a security group?
A collection of user accounts used to assign permissions and rights more efficiently.
What is the primary function of the Administrators group?
Members have very high access to all files and system tasks.
What happens when the Guest user account is enabled?
It allows file sharing without passwords but is disabled by default.
What does User Account Control (UAC) do?
Protects the system against malicious scripts and requires user consent for performing privileged tasks.
What is multifactor authentication (MFA)?
A security process that requires the user to provide at least two different kinds of credentials.
What is 2-step verification?
A method where a soft token is generated and sent to a registered method to verify a sign-in request.
What is an authenticator application?
An application that can be used for passwordless access or as a two-factor authentication mechanism.
What is hard token authentication?
Authentication using a physical device like a smart card or USB drive to transmit credentials.