Acc Ctrl Flashcards
3 primary types of access control
preventive, detective, and corrective.
secondary types of access control
There are also four other access control types, commonly known as deterrent, recovery, directive, and compensation access controls
process by which a subject professes an identity and accountability is initiated
Identification
process of verifying or testing that a claimed identity is valid
Authentication
indicates who is trusted to perform specific operation
Authorization
which AAA protocol is done via auditing, logging, and monitoring, ensures that subjects can be held accountable for their actions. Auditing is the process of tracking and recording subject activities within logs
Accountability
RSA token is what kind of token (sync/async, static/dynamic)?
is a synchronous dynamic password token. It generates passwords at fixed time intervals, such as every 60 seconds
(sync or async) dynamic password token does not use a clock; it generates passwords based on an occurrence of some event. These tokens often generate a password after the user enters a PIN into the token device.
asynchronous
Which access control model? Every object has an owner, owners have full control over their objects. Permissions are maintained in an ACL, and owners can easily change permissions.
Discretionary access control (DAC)
Which access control model? Access does not focus on user identity. Instead, a static set of rules governing the whole environment is used to manage access
Non-Dac
Rule-based access controls and lattice-based access controls are both considered ….
non-dac
Which access control model?relies upon the use of classification labels. Each classification label represents a security domain, or a realm of security.
MAC
SSO solution for login, symmetric key crypto, AES encryption protocol. Provides confidentiality AND integrity for authentication.
Kerberos
AAA protocols
provide authentication, authorization, and accounting (sometimes ID is included). typically used for VPN and other centralized access controls.
3 common AAA protocols are …
RADIUS, TACACS+, and Diameter.
various TYPES of access control (7):
Preventive, Detective, corrective, recovery, directive, compensation, recovery.
birthday attack
birthday attack focuses on finding collisions. similar to finding two pswds with same hash. Ex = 50 ppl in room, 2 will have same bday.
a variant of phishing that uses the phone system or VoIP. A common attack uses an automated call to the user explaining a problem with a credit card account.
Vishing
name 4 different password attacks:
dictionary attacks, brute-force attacks, rainbow table attacks, and sniffer attacks
What attack uses….all possible combinations of keyboard characters used.
brute-force
What attack uses…. a predefined list of possible passwords possibly used
dictionary attack.
Sym or Asym…..cryptosystems use a shared secret key available to all users of the cryptosystem.
symmetric
Sym or Asym … cryptosystems utilize individual combinations of public and private keys for each user of the system
Asymmetric
AND function
returns TRUE only when X&Y are TRUE. 1+1=1, else 0