Access Control Flashcards
CIA
Confidentiality, Integrity, Availability
Aceess controls protect against:
Threats such as unauthorized acess, inappropriate modification of data, and loss of confidentiality
DAD
Opposing forces of CIA. Disclosure, Alteration, Destruction
Confidentiality
Seeks to prevent unauthorized read access. Example is PII
Integrity
Seeks to prevent unauthorized modification of information
Two types of Integrity
Data Integrity & System Integrity
Data Integrity
seeks to protect information against unauthorized modification
System integrity
seeks to protect a system from unauthorized modification
Availability
ensures that information is available when needed
AAA
Authentication, Authorization, Accountability
Identity
a claim of who you are (like a username)
Authentication
proving an identity claim (like a password)
Authorization
actions you perform on a system once you have identified and authenticated. May include, read, write, execute files/programs
Accountability
holds users accountable tofr their actions. Typically done by logging and analyzing audit data
Non-Repudiation
user cannot deny having performed a transaction. You must have authentication and integrity to have non-repudiation
Least privilege
users should be granted the minimum amount of access (authorization) required to do their jobs
Need to know
user must need to know that spcific piece of information before accessing it (user must have a business need to access data)
Subject
an active entity on a system. Manipulate objects
Object
Passive data on a system. Do not manipulate other objects
Defense in Depth
applies multiple safeguards (called controls) to protect an asset
Which Access control model is the best?
none, each model is used for a specific information security purpose
What are the primary Access Control Models?
Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Non-Discretionary Access Control
What is DAC?
Discretionary Access Control?gives subjects full control of objects they have been given access to, includeing sharing the objects with other subjects
What is MAC?
Mandatory Access Control?primarily for Gov’t/Military?system-enforced access control based on subject clearance level and object labels
