Chapter 13- Managing Identity and Authentication (IAM) Flashcards
- What is a subject?
Subject is an active entity that accesses a passive object to receive information from or data about an object.
- Subject can be:
users, programs, processes, services, computers or anything that can access a resource
- List company assets:
information (data), systems (IT e.g. fileserver), devices (servers, laptops), facilities (building) and personnel (staff)
- What is an object?
Object is a passive entity that provides information to active subjects.
- Examples of objects are:
files databases, computers, programs, processes, services, printers and storage media.
- What is the primary reason why organizations implement access control mechanisms?
to prevent losses.
- There are 3 categories of IT losses:
Loss of confidentiality, Integrity and Availability
- List security Triad (aka AIC triad, CIA Triad):
Confidentiality, Integrity and Availability.
- What is confidentiality?
Access Controls help ensure that only authorised subjects can access objects.
- What is integrity?
Integrity ensures that data or system configurations are not modified without authorization or that is authorized changes occur security controls detect the changes.
- What is availability?
Availability means that authorised requests for objects must be granted to subjects within a reasonable amount of time.
- Types of access control:
corrective, preventive and detective.
- What is Access Control?
Access Control is any hardware, software, administrative policy or procedure that controls access to resources.
a
a
- List 4 other types of control
a
- What is Preventive Control:
Preventive Control attempts to thwart or stop unwanted or unauthorised activity from occurring
- What is Detective Access Control?
Detective attempts to discover or detect unwanted or unauthorised activity.
- What is Corrective Access Control:
Corrective Control modifies the environment to return the systems to normal after an unwanted or unauthorised activity has occurred.
- What are Deterrent Control?
Deterrent Access Control attempts to discourage security policy violations. it is very similar to preventive controls but depends on individuals deciding not to take unwanted action.
- What is Recovery Access Control?
Recovery Access Control attempts to repair or restore resources, functions and capabilities after a security policy violation.
- What is Directive Access Control?
Directive Access Control attempts to direct, confine or control the actions of subjects to force or encourage compliance with security policies.
- What are Compensating Access Control
A compensating Access Control provides an alternative when it is not possible to use a primary control. or when necessary to increase the effectiveness of a primary control.
- List access control types based on implementations:
physical, technical and administrative
- What are Administrative Access Controls?
Administrative Access controls are policies and procedures defined by an organisation’s security policy and other regulations or requirements. They are sometimes referred to as management controls.