Access Control Flashcards
(11 cards)
What are the three main security principles?
- Confidentiality
- Integrity
- Availability
What are the four steps that must happen to access an object?
- Identification
- authentication
- Authorization
- Accountability
What do the following terms mean:
- Access
- Subject
- Object
Access: the flow of information between a subject and an object.
Subject: an active entity that requires access to an object or the data within an object. A subject may be a user, a program or a process that access an object.
Object: a passive entity that can be a computer, a database file, a program, directory or a field
What are the three factors of authentication?
- Authentication by knowledge e.g password
- Authentication by ownership e.g swipe card
- Authentication by characteristic e.g biometric
What are the types of identity management technologies.
- Directories
- web access management
- password management
- legacy single sign-on
- Account management
- profile update
What are the types of Password management?
- Password synchronization - reduces the complexity of keeping up with different passwords for different systems.
- Self-service Password Reset - reduces help-desk call volumes by allowing users to reset their own passwords.
- Assisted password reset - reduces the resolution process for password issues for the help desk. e.g. help desk
What is a federation identity?
This is a a portable identity, and its associated entitlements, that can be used across business boundaries. It allows a user to be authenticated across multiple IT systems and enterprises.
What is SAML?
Security Assertion Markup Language: it is a XML standard that allows the exchange of authentication and authorization data to be shared between security domains.
What are types of password controls that an administrator can put in place.
- Password Checkers
- Password Hashing and Encryption
- Password Aging
- Limit Logon Attempts
- Cognitive Password
- One- Time Password
- Token Device ( synchronous or asynchronous)
- Cryptographic keys
- Passphrase
- Memory card
- Smart cards
What are the three Access Control Models?
DAC - Discretionary Access Control: Data owners decide who has access to resources, and ACLs are used to enforce these access decisions.
MAC - Mandatory Access Control. The operating systems enforce the system’s security policy through the use of security labels.
RBAC - Role Base Access Control. Access decisions are made based on each subject’s role and/or functional position.
What are Access Control Techniques used in conjunction with the Access Control Models?
Access control matrix: Table of subjects and objects that outlines access relationships.
Access control list (ACL): Bound to an object and indicates what subjects can access it and what operations they can carry out.
Capability table: a capability table, UNLIKE an ACL, is bounded to subjects. It indicates what objects that subjects can access and what operations it carry out.
Content-based access: Bases access decisions on the sensitivity of the data, not soley on identity or content sensitivity.
Context-based access: Bases access decisions on the state of the situation, not solely on identity or content sensitivity.
Restricted interface: Limits the user’s environment within the system, this limiting access to objects. Example: ATM interface.
Rule-based access: Restricts subjects’ access attempts by predefined rules.