Domain 5 Flashcards

1
Q

Access Control System

A

Means to ensure that access to assets is authorized and restricted based on business and security requirements related to logical and physical systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control Tokens

A

The system decides if access is to be granted or denied based upon the validity of the token for the point where it is read based on time, date, day, holiday or other condition used for controlling validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accounting

A

Access control process which records information about all attempts by all identities to access any resources of the system. See also authentication, authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attribute- based Access Control (ABAC)

A

This is an access control paradigm whereby access rights are granted to users with policies that combine attributes together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

Access control process that validates the identity being claimed by a user or entity is known to the system, by comparing one or more factors of identification. Factors typically include something the user is, something they have and something they know (such as a fingerprint, a hardware questions). Single-factor (SFA) authenticates with only one of these; multi-factor (MFA) uses two or more. security token and answers to challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

The process of defining the specific resources a user needs and determining the type of access to those resources the user may have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Crossover Error Rate (CER)

A

This is the point at which the false acceptance (or Type 2) error rate equals the false rejection (Type 1) error rate, for a given sensor used in a given system and context. This is only the optimal point of operation if the potential impacts of both types of errors are equivalent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Custodian, Custodian

A

The individual who manages permissions and access on a day-to-day basis based on instructions from the data owner. Responsible for protecting an asset that has value, while in the custodian’s possession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Owner/ Data Controller

A

The individual or entity who is responsible to classify, categorize and permit access to the data. The data owner is the one who is best familiar with the importance of the data to the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Processor

A

Any entity, working on behalf or at the direction of the data controller, that processes personally identifiable information (PII).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Discretionary Access Control (DAC)

A

Access control in which the system owner decides who gets access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ethical Wall

A

The separation of information, assets or job functions to establish and enforce need to know boundaries or prevent conflict of interest situations from arising. The use of administrative, physical and/ or logical controls to establish, maintain and monitor such separations. Also known as a compartment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

False Acceptance Rate (FAR or Type 2)

A

Incorrectly authenticating a claimed identity as legitimate and recognized and granting access on that basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

False Rejection Rate (FRR or Type 1)

A

Incorrectly denying authentication to a legitimate identity and thus denying it access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Granularity of Controls

A

Level of abstraction or detail at which a security function can be configured or tuned for performance and sensitivity purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identity as-a- Service (IDaaS)

A

Cloud-based services that broker IAM functions to target systems on customers’ premises and/or in the cloud.

17
Q

Identity Proofing

A

The process of collecting and verifying information about a person for the purpose of proving that a person who has requested an account, a credential or other special privilege is indeed who they claim to be and establishing a reliable relationship that can be trusted electronically between the individual and said credential for purposes of electronic authentication.

18
Q

Logical Access Control System

A

Automated systems that authorize or deny access to and use of an information system and its assets to an individual user, based on verification that the identity presented matches that which was previously approved.

19
Q

Mandatory Access Controls (MAC)

A

Access control that requires the system itself to manage access controls in accordance with the organization’s security policies.

20
Q

Multi-factor Authentication (MFA)

A

Ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity.

21
Q

Open Authorization (OAuth)

A

The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.

22
Q

Privilege Creep

A

The unnecessary accumulation of access privileges by a user, typically due to failing to remove privileges when they are no longer needed.

23
Q

Self-Service Identity Management

A

Elements of the identity management lifecycle and provisioning process, which the end user (the identity in question) can initiate or perform with little or no interaction or assistance from administrators. Examples include password resets, postal address updates or changes to challenge questions and answers.

24
Q

Single-Factor Authentication (SFA)

A

Involves the use of simply one of the three available factors solely to carry out the authentication process being requested.

25
Q

Whaling Attack

A

Phishing attacks that attempt to trick highly placed officials or private individuals with sizable assets into authorizing large fund wire transfers to previously unknown entities.