Chapter 12 - Access Management Flashcards

1
Q

Access control

A

The mechanism used in an information system for granting or denying approval to use specific resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

Checking the delivery persons credentials to be sure that they are authentic and not fabricated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

Granting permission to take an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting

A

A record that is preserved of who accessed the network, what resources they accessed, and when they disconnected from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Object

A

An object is a specific resource, such as a file of a hardware device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Subject

A

A subject is a user of a process functioning on behalf of the user that attempts to access an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Operation

A

The action that is taken by the subject over the object is called an operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control model

A

A predefined framework found in hardware and software that a custodian can use for controlling access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Discretionary access control (DAC)

A

The least restrictive access control model in which the owner of the object has total control over it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mandatory access control (MAC)

A

The most restrictive access control model, typically found in military settings in which security is of supreme importance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Role-based access control (RBAC)

A

A “real-world” access control model in which access is based on a users job function within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rule-Based Access Control

A

An access control model that can dynamically assign roles to subjects based on a set of rules defined by a custodian.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribute-Based Access Control (ABAC)

A

An access control model that uses more flexible policies that can combine attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Employee onboarding

A

The tasks associated when hiring a new employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employee offboarding

A

The tasks associated when an employee is released from the enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Location-based policies

A

Policies that establish geographical boundaries where a mobile device can and cannot be used.

17
Q

Time-of-day restriction

A

Limitation imposed as to when a user can log in to a system or access resources.

18
Q

Recertification

A

The process of periodically revalidating a users account, access control, and membership role or inclusion in a specific group.

19
Q

Permission auditing and review

A

A review that is intended to examine the permissions that a user has been given to determine if each is still necessary.

20
Q

Usage auditing and review

A

An audit process that looks at the applications that the user is provided, how frequently they are used, and how they are being used.

21
Q

Separation of duties

A

The practice of requiring that processes should be divided between two or more individuals.

22
Q

Job rotation

A

The act of moving individuals from one job responsibility to another.

23
Q

Clean desk policy

A

A policy designed to ensure that all confidential or sensitive materials are removed from a users workspace and secured when the items are not in use or an employee leaves her workspace.

24
Q

File system security

A

Security functions provided by access control lists (ACLs) for protecting files managed by the operating system.

25
Database security
Security functions provided by access control lists (ACLs) for protecting SQL and relational database systems.
26
Group-based access control
Configuring multiple computers by setting a single policy for enforcement.
27
RADIUS (Remote Authentication Dial In User Service)
An industry standard authentication service with widespread support across nearly all vendors of networking equipment.
28
Kerberos
An authentication system developed by MIT and used to verify the identity of networked users.
29
TACACS+ (Terminal Access Control Access Control System)
The current version of TACACS authentication service.
30
Directory service
A database stored on the network itself that contains information about users and network devices.
31
Lightweight Directory Access Protocol (LDAP)
A protocol for a client application to access an X.500 directory.
32
Security Assertion Markup Language (SAML)
An extensible markup language (XML) standard that allows secure web domains to exchange user authentication and authorization data.
33
Extensible authentication protocol (EAP)
A framework for transporting the authentication protocols which was created as a more secure alternative to the weak CHAP/MS-CHAP.
34
Challenge-Handshake Authentication Protocol (CHAP)
A weak version of Extensible Authentication Protocol (EAP).
35
MS-CHAP
The Microsoft version of Challenge-Handshake Authentication Protocol (CHAP).
36
Password Authentication Protocol (PAP)
A weak version of Extensible Authentication Protocol (EAP).