5. Logical and Physical Access Control Flashcards
(41 cards)
Logical access control: what is often used to manage?
Logical access control software: by function or application, who can read, copy, write, create update, delete, execute.
Logical access control: what kind of proof is used for user authentication?
- Proof by knowledge: passwords
- Proof by knowledge and possession: security tokens/credit cards
- Proof by physical identifier: biometric controls (thumbprint, retina patterns, voice-print, face)
- Proof by mannerism/context: touch on the keyboard, time of system use
- Multi-factor authentication: multiple authentication procedures - highly secure
Logical access control: Password (knowledge): how good are they? How are they need to be?
- Not so good authentication system.
- Need to be strong (i.e. impossible to remember - use password manager?): eight or longer characters, include upper/lower case letters, one numeral and one special character, change periodically (every 3 months?)
Logical access control: Password: what is an effective control?
Standard: lockout after 3 failed attempts with reset.
Logical access control: what is security token?
One-time password (device displays; user inputs device password, user ID and account password) - e.g. new password: generate every 30-60 seconds
Logical access control: what are smart cards and identification badges?
Embedded identification information read by card reader
e.g. credit card chip
Logical (electronic) access control: what does user authorization matrix do?
Define user’s access rights based on role.
Logical access control: what makes security (challenge) questions good?
Safe, memorable, stable, definitive.
Should not use something people could easily search for.
Logical access control: what are 3 kinds of firewall?
NAP: Network, Application, Personal
Logical access control: what is and does firewall do?
Prevent and detect unauthorized access.
Hardware and/or software to review and filter network traffic.
e.g. block noncompliant data packets based on set parameters.
Logical access control: what is and does network firewall do?
On a network (e.g. server).
- Filters data packets based on header info (source and destination IP address and communication port)
- Blocks noncompliant transmission based on rules in access control list
- Very fast (examine headers only)
- Forward approved packets to application firewall
Logical access control: what is application firewall?
- Inspect data packet contents
* Can perform deep packet inspection (detailed packet examination)
Logical access control: what is personal firewall?
Software enabling end-users to block unwanted network traffic.
Usually on a home network or computer.
Logical access control: what is IDS? What does it do?
Intrusion Detection Systems.
*Monitors network for anomalies
Logical access control: IDS: what are 3 identification methods?
- Signature-based: stored patterns/sources
- Statistical-based: unusual activity - modeling
- Neural networks: learns from created database
Logical access control: what is IPS? Example?
Intrusion Prevention Systems - allows identification and blocking from live systems
E.g. honeypot/honeynet: allow hackers access to a decoy system
What are IT facilities?
- Computer hardware (CPUs, disk and tape drivers, printers, communications devices, etc)
- Software (program files)
- Data files
- Computing infrastructure (network communication media and devices) computing rooms and buildings in which they reside
What does IT facility control?
General controls
- Some preventative controls: e.g. restricting access to IT dept
- Some corrective controls: e.g. program and data backup, disaster recovery
What are power system risks?
- Failure (blackout)
- Reduced voltage (brownout)
- Sags, spikes, surges
- Electromagnetic interference (EMI)
What are environmental (physical location) controls?
- Alarm control panel
- Water and smoke detectors
- Climate control, humidity
- Fire extinguishers
- Manual fire alarms
- Uninterruptible power supply
Physical location controls: fire suppression system: What are needed?
Fire suppression systems appropriate for electrical fires *chemical suppressor (halon no longer used) or water
*periodic maintenance
Physical access controls: what must be done re: mainframe/large system?
- Restrict access to programs, data files, and computer hardware (e.g. identification badges)
- Additional restrictions: locks, keypad devices, access card readers, security personnel, and surveillance
- Secrecy: Keep IT facilities location private
Logical access controls: what are system penetration risk?
- “Social engineering”: seek access by tricking employees
* May be conducted by “white” hackers (those hired by other companies) or “black” hackers (criminals, etc)
Physical/logical access control: what is physical access risks and responses?
Piggybacking = unauthorized user follows and uses authorized user credentials
Response: restricted it by electronic/logical access controls (in a computer lab), physical controls (computer room)