Access Control Flashcards
(94 cards)
Access Control Systems include
File Permissions, Program Permissions and Data Rights
File Permissions allows
Create, Read, Edit or Delete on a File Server
Program Permissions allows
execution of a program on a server.
Data Rights allows
right to retrieve or update information in a database.
A “SUBJECT” is
an ACTIVE entity i.e., an individual or process that accesses an OBJECT.
An “OBJECT” is
a PASSIVE entity i.e., system or process that a SUBJECT ACTS UPON or accesses.
PREVENTIVE controls are for
reducing risk.
DETECTIVE controls are for
identifying violations and incidents.
CORRECTIVE controls are for
remedying violations and incidents and improving existing preventive and detective controls.
DETERRENT controls are for
discouraging violations and dissuading malicious activity.
RECOVERY controls are for
restoring systems and information.
COMPENSATING controls are for
providing alternative ways of achieving a task.
Preventive controls together with and overall security program are compensated by
DETECTIVE, CORRECTIVE, DETERRENT, RECOVERY and COMPENSATING controls.
ACCESS controls can be
Administrative, Technical, and Physical
ADMINISTRATIVE controls include
policies and procedures that are implemented as part of an overall information security strategy
Types of ADMINISTRATIVE controls may include
policies, standards, guidelines and procedures. Security awareness training. Asset clarification and control. Employment policies. Account administration. Account, log and journal monitoring. Review of audit trails.
TECHNICAL controls are
technical ( or logical ) controls that leverage HW or SW to implement access control.
PREVENTIVE TECHNICAL controls include
encryption, access control mechanisms, access control lists ( ACLs), Remote Access authentication protocols.
Common technical ENCRYPTION controls are
DES ( Data Encryption Standard ) AES ( Advanced Encryption Standard ) and Merkle-Hellman Knapsack.
Access Control Mechanisms are
Biometrics, Smart Cards, and Tokens.
Access Control Lists ( ACLs ) are
permission defining what a SUBECT can or cannot do to an object.
Remote Access Authentication Protocols are
PAP ( Password Authentication Protocol ) CHAP ( Challenge HandShake Authentication Protocol ) RADIUS ( Remote Authentication Dial In User Service ) and LDAP ( Lightweight Directory Access Protocol )
DETECTIVE TECHNICAL controls include
Violation reports, Audit Trails, Network Monitoring and Intrusion Detection.
PHYSICAL controls ensure
safety and security of the physical environment they are primarily PREVENTIVE AND DETECTIVE.