access control Flashcards

1
Q

access control

A

a collection of mechanisms that work together to create security architecture to protect the assets of an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

security policy

A

states who is allowed to do what

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are some examples of objects

A

file
directory
data
service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

authorisation

A

checks whether a request for an object can be granted
the act of setting the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

reference monitor

A

the guard enforcing the policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

where is the access control list

A

attached to each object in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

accountability

A

a security goal that allows actions of an entity to be tracked back to that entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are some benefits of accountability (3)

A

can investigate parties involved in a breach
can check whether an organisation is following regulations
allows for deterrence, fault isolation, intrusion detection and prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

physical access control

A

using locks security guards badges etc to control people/vehicles entering a protected area via authentication and authorisation
prevents gaining physical access into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

information/asset owner

A

responsible for who uses the system and how to recover it in a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

logical access control

A

prevents logical (usually remote) access via the validation of a users identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

confidentiality in CIA

A

protect data and personal privacy from leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

integrity in CIA

A

ensure accuracy completeness consistency and validity of the organisations or a persons data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

availability in CIA

A

data should be available when requested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

in which four ways can we allocate privileges

A

mandatory access control
discretionary access control
the least privilege
role based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

mandatory access control

A

the security policy is centrally controlled by a policy/security administrator therefore the rules are set by the system and enforced for all users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is access based on in mandatory access control

A

subjects objects and labels

18
Q

subjects in mandatory access control

A

people or other systems that are granted clearance

19
Q

objects in mandatory access control

A

assets being protected

20
Q

labels in mandatory access control

A

binds the object to the subject
defines whether a subject can access an object based on the labels classification

21
Q

discretionary access control

A

decentralised
allows the object owner to grant permissions to other users

22
Q

what does the access control list contain in discretionary access control

A

user id file names and permissions

23
Q

what are some examples of permissions

A

read
write
update
delete
rename
execute

24
Q

the least privilege

A

giving people the least amount of access required to do their job

25
what is the benefit of using the least privilege
lesser risk of leaking data and compromising the integrity
26
role based access control
each user is assigned to a group then assigning access control rights to each group
27
benefits of role based access control
good for high number of employees and frequently changing roles stops a single user from becoming too powerful
28
what must we do before handing over privileges
check identity and the handover phase must be secure
29
how do we record privileges
using logs
30
why do we monitor access
helps notice abnormal behaviour users may become malicious via malware on their device collect data for security incidents identification and authentication mechanisms may be vulnerable users may want to extend privileges illegally
31
why do we monitor password systems
evidence of password experimentation (forgetting it) evidence of logins when the user is absent
32
audit policies
define which events will be logged
33
which section of access control uses event logs and how may attackers interact with them
used by accountability attackers may attempt to hide their traces by deleting relevant logs but in a secure system they shouldnt be able to tamper with the evidence already logged
34
hashing
using a hash function to encrypt plaintext
35
what are the 2 things that hashing must do
be one way; it can only be solved via brute force be collision resistant; cybertext shouldnt have duplicates
36
what is salting and where is the salt stored
adding random data to the pw before hashing the salt is stored with the encrypted data
37
what are benefits of salting
prevents cracking methods the same string will hash into different values at different times users with the same password will have different encrypted passwords stored
38
what must we do before doing a brute force attacks
guaranteed to work eventually must determine the alphabet used as some special characters are excluded from passwords
39
rainbow table attacks
predocumented lookup table for storing hashes
40
dictionary attacks
only work if the pw is already in the dictionary