Chapter 6 - Access Controls Flashcards

1
Q

Access Control

A

Protecting a resource so that it is only accessed by those allowed to use it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Parts of four-part access control

A
  1. Identification
  2. Authentication
  3. Authorization
  4. Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policy definition phase

A

Define who has access and which resources they can use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policy enforcement phase

A

Reject or grant requests for access based on authorizations from the definition phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two types of access controls

A
  1. Physical
  2. Logical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical access controls

A

Control entry into a building or other protected area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of physical access controls

A

Smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logical access controls

A

Control entry into a computer system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Example of logical access controls

A

Pin or biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The security kernel is what?

A

The central point of access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security kernel (Definition)

A

permits access when conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Components of access control

A

Users, resources, actions, and relationships (conditions between users and resources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Synchronous token

A

Use time or events to synchronize with an authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asynchronous token

A

uses a challenge-response mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of biometrics

A

dynamic and static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dynamic biometrics examples

A

voice inflections or keyboard strokes (what you do)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Static biometrics examples

A

fingerprints, facial recognition (what you are)

18
Q

Advantages of biometrics

A

person must be physically present, difficult to fake, don’t have to worry about lost IDs or forgotten passwords

19
Q

Disadvantages of biometrics

A

physical characteristics may change, required devices are expensive

20
Q

Single sign-on (SSO)

A

sign onto a computer or network once and then be allowed access into all computers and systems where authorized

21
Q

Advantages of SSO

A

Efficient, reduces human error, locks out users with too many failed attempts

22
Q

Disadvantages of SSO

A

compromised passwords grant complete access to an intruder, limited security, authentication server can become a single point of failure

23
Q

Identification

A

who is trying to gain access?

24
Q

Authentication

A

can their identities be verified?

25
Authorization
what can the requestor access and modify
26
Accountability
how are actions traced to an individual to ensure that the person who does them can be identified
27
Discretionary access controls (DAC)
owner of a resource decides who can access it
28
Mandatory access controls (MAC)
determines level of restriction by sensitivity of resource using classification labels
29
MAC and NAC are
Stronger than DAC
30
Nondiscretionary access controls (NAC)
access rules are closely managed by the security administrator, not the owner or other users
31
Rule-based access control
explicit rules grant access
32
Role-based access control
grants access based on a user's role in an organization
33
Credential and permissions management
systems that provide the ability to collect, manage, and use information associated with access control
34
Private cloud computing
all components are managed by the organization
35
Community cloud computing
Components are shared by several organizations
36
Public cloud computing
Available for public use and managed by third-party providers
37
Hybrid cloud computing
Contains components of more than one type of cloud
38
Advantages of cloud computing
No need to maintain a data center or disaster recovery site
39
Disadvantages of cloud computing
More difficult to keep data secure, greater potential for data leakage
40
Multi-factor authentication
Requires you to provide a combination of two or more factors in order to verify your identity
41
Types of factors for MFA
Something you know (such as a password) Something you have (such as a smartphone) Something you are (such as facial recognition)