ch 12 Flashcards

(71 cards)

1
Q

Granting or denying approval to use specific resources

A

• Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Consists of fencing, hardware door locks, and mantraps to limit contact with devices

A

Physical access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Consists of technology restrictions that limit users on computers from accessing data

A

Technical access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is it called when Presenting credentials

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is it called when Checking the credentials

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is it called when Granting permission to take action

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A record that is preserved of who accessed the network, what resources they accessed, and when they disconnected

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A specific resource

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user or process functioning on behalf of a user

Example: computer user

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The action taken by the subject over an object

Example: deleting a file

A

Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Standards that provide a predefined framework for hardware or software developers
Use the appropriate model to configure the necessary level of control

A

Access control model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(D A C)

A

• Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Least restrictive model
Every object has an owner
Owners have total control over their objects
Owners can give permissions to other subjects over their objects

A

• Discretionary Access Control (D A C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• (M A C)

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Most restrictive access control model User has no freedom to set any controls or distribute access to other subjects
Typically found in military settings

A

• (M A C) Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Every entity is an object and is assigned a classification label that represents the relative importance of the object

A

Labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a hierarchy based on the labels is used

A

Levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

grants permissions by matching object labels with subject labels

A

M A C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(B L P)

A

Bell-LaPadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

(M I C)

A

Mandatory Integrity Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(U A C)

A

User Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • a Windows feature that controls user access to resources
A

User Access Control (U A C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

(RBAC)

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Also called Non-Discretionary Access Control

Access permissions are based on user’s job function

A

(RBAC) Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
(RBAC)
Rule-Based Access Control
26
Dynamically assigns roles to subjects based on a set of rules defined by a custodian Each resource object contains access properties based on the rules
(RBAC) Rule-Based Access Control
27
When initially setting up an account, take these into consideration:
``` Employee accounts Creating location-based policies Establishing standard naming conventions Creating time-of-day restrictions Enforcing least privilege ```
28
Employee On-boarding steps:
``` Scheduling Job duties Socializing Work space Training ```
29
Employee offboarding Steps
Exit interview Back up all employee files from local computer and server Archive email Forward email to a manager or coworker Hide the name from the email address book
30
- user accounts that remain active after an employee has left
Orphaned accounts
31
an account that has not been accessed for a lengthy period
Dormant account
32
relies upon location-based policies | Or establishing the geographical boundaries of where a mobile device can and cannot be used
Geofencing
33
Means that only the minimum amount of privileges necessary to perform a job or function should be allocated
• Least Privilege
34
the process of periodically revalidating a user’s account, access control, and membership role
Recertification
35
intended to examine the permissions that a user has been given to determine if each is still necessary
Permission auditing and review
36
– an audit process that looks at the applications that the user is provided, how frequently they are used, and how they are being used
Usage auditing and review
37
• Best Practices for Access Control
Separation of duties Job rotation Mandatory vacations Clean desk policy
38
the process should be divided between two or more individuals
• Separation of Duties
39
Limits amount of time individuals are in a position to manipulate security configurations Helps expose potential avenues for fraud
• Job Rotation
40
Limits fraud, because perpetrator must be present daily to hide fraudulent actions
• Mandatory Vacations
41
Designed to ensure that all confidential or sensitive materials are removed form a user’s workspace and secured when the items not in use
• Clean Desk Policy
42
(A C L s)
Access control lists
43
A set of permissions attached to an object
Access control lists (A C L s)
44
Each entry in the A C L table is called
access control entry (ACE)
45
(SID)
Security identifier
46
for the user or group account or logon session
Security identifier (SID)
47
Permits the configuration of multiple computers by setting a single policy for enforcement
Group-based access control
48
(A D)
Active Directory
49
A Microsoft Windows feature that provides centralized management and configuration of computers and remote users using
Active Directory (A D)
50
(G P O s)
Group Policy Objects
51
Usually used in enterprise environments | Settings stored in
Group Policy Objects (G P O s)
52
(L G P)
Local Group Policy
53
Has fewer options than a Group Policy | Used to configure settings for systems not part of A D
Local Group Policy (L G P)
54
• R A D I U S
Remote Authentication Dial In User Service
55
Developed in 1992 Became an industry standard Originally designed for remote dial-in access to a corporate network
• R A D I U S
56
Typically a device such as a wireless A P | Responsible for sending user credentials and connection parameters to the RADIUS server
R A D I U S client
57
Authentication system developed at M I T Uses encryption and authentication for security Works like using a driver’s license to cash a check
• Kerberos (Tickets) (SSO)
58
Symmetric based encryption
Originally DES now AES, 3DES Uses the Diffe-Hellman key agreement Requires mutual authentication
59
(T A C A C S +)
• Terminal Access Control Access Control System
60
Authentication service similar to R A D I U S Commonly used on UNIX devices Communicates by forwarding user authentication information to a centralized server
(T A C A C S +)
61
(L D A P)
• Lightweight Directory Access Protocol
62
A directory service is a database stored on a network Contains information about users and network devices Keeps track of network resources and user’s privileges to those resources
• Lightweight Directory Access Protocol (L D A P)
63
Designed to run over T C P/I P A simpler subset of D A P Encodes protocol elements in simpler way than X.500
L D A P
64
Weakness of L D A P
Can be subject to L D A P injection attacks Similar to S Q L injection attacks Occurs when user input is not properly filtered
65
S A M L | E-COMMERSE
• Security Assertion Markup Language
66
An Extensible Markup Language (X M L) standard that allows secure web domains to exchange user authentication and authorization data
S A M L | • Security Assertion Markup Language
67
(C H A P)
Challenge-Handshake Authentication Protocol
68
(M S - C H A P)
The Microsoft version of C H A P
69
(P A P)
Password Authentication Protocol
70
(E A P)
Extensible Authentication Protocol
71
Defines the format of the messages Uses four types of packets: Request, response, success, and failure
E A P: