Chapter 17: Managing Identities and Access Flashcards

(39 cards)

1
Q

access control mechanism

A

dictates how subjects access objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

reference monitor

A

abstract machine which mediates all access subjects have to objects: to ensure subjects have necessary access rights and to protect objects from unauthorized access and destructive modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

six main access control models

A

discretionary, mandatory, role-based, rule-based, attribute-based, risk-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC

A

discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

discretionary access control

A

data owners dictate what subjects have access to files and resources they own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

access control lists

A

bound to objects and indicate what subjects can use them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC

A

mandatory access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

mandatory access control model

A

uses a security label system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC model

A

users have clearances and resources have security labels with data classifications; MAC system compare these two attributes to determine access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IFTTT rules

A

if this, then that

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

most granular of the access control models

A

ABAC; Attribute-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XML

A

Extensible Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Extensible Markup Language

A

rules for encoding documents in machine-readable form for interoperability between various web technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SPML

A

Service Provisioning Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Service Provisioning Markup Language

A

automation of user management and access entitlement configuration for electronically published services across multiple provisioning systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAML

A

Security Assertion Markup Language; exchange of authentication and authorization data to be shared between security domains

17
Q

XACML

A

Extensible Access Control Markup Language

18
Q

Extensible Access Control Markup Language

A

declarative access control policy language in XML and a processing model which interprets security policies

19
Q

OAuth

A

open standard which allows a user to grant authority to some web resource, like a contacts database, to a third party

20
Q

OpenID Connect

A

authentication layer built on OAuth 2.0 protocol which allows transparent authentication and authorization of client resource requests

21
Q

Kerberos

A

client/server authentication protocol based on symmetric key cryptography which provides single sign-on (SSO) for distributed environments

22
Q

KDC

A

key distribution center; most important component within a Kerberos environment because it holds all users’ and services’ secret keys, provides an authentication service, and securely distributes keys

23
Q

TGT

A

ticket granting ticket; Kerberos users receive a TGT, which allows them to request access to resources through the TGS, which generates a new ticket with the session keys

24
Q

TGS

A

ticket granting service

25
weaknesses of Kerberos
KDC is a single point of failure; susceptible to password guessing; session and secret keys are locally stored; KDC needs to always be available; management of secret keys is required
26
Remote access control technologies
RADIUS, TACACS+, Diameter
27
identity and access provisioning life cycle
provisioning, access control, compliance, configuration management, and deprovisioning
28
system account
created by the operating system for use by a particular process, not by a human
29
service account
system account for a process that runs as a service (i.e. it listens for and responds to requests from other processes)
30
authorization creep
when a user gains too much access rights and permissions over time
31
MSAs
managed service accounts; Active Directory domain accounts used by services and provide automatic password management
32
Role-based access control reduces administrative burdens by ...
administrator assigns permissions and rights to a role, and users are plugged into those roles; admin does not need to revoke or reassign permissions to individuals users as they change jobs
33
challenge/response mechanism
asynchronous token
34
capability- based access control system
subject (user) has to present an item (ticket, token, or key) which outlines what it can access. capability is tied to the subject for access control purposes
35
specialized, require extensive administration, expensive, reduce user functionality
MAC (mandatory access control) and multilevel security
36
ACLs
access control lists; can be modified to provide tighter access control; bound to objects and outline which operations specific subjects can carry out on them
37
based on symmetric cryptography
Kerberos
38
SOA
service-oriented architecture
39
service-oriented architecture
allows team to create a centralized web portal and offer the various services needed by internal and external entities