domain 1: Access Control Flashcards

(36 cards)

0
Q

access control models

A

mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

CIA Triad

A

confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

confidentiality

A

seeks prevent the unauthorized disclosure of information: it keeps data secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

integrity

A

seeks to prevent unauthorized modification of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

availability

A

ensures that information is available when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

identification

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

proving an identity claim is called:

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describes the actions you can perform on a system once you have identified and authenticated

A

Authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

typically accomplished by logging and analyzing audit data

A

accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

active entity on a data system

A

subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

passive data within the system

A

object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

discretionary access control

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

mandatory access control

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

role-based access control

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

false reject rate

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

false accept rate

16
Q

crossover error rate

17
Q

seeks to protect information against unauthorized modification

A

Data integrity

18
Q

seeks to protect the system such as Windows 2012 server operating system from unauthorized modification

A

System integrity

19
Q

The CIA Triad may also be described by its opposite

A

disclosure alteration and destruction

20
Q

AAA

A

authentication authorization and accountability

21
Q

means a user cannot deny having performed the transaction

A

non-repudiation

22
Q

means users should be granted the minimum amount of access required to do their jobs but no more

A

least privilege

23
Q

more granular than least privilege: the user must need to know that specific piece of information before accessing it

24
applies multiple safeguards (also called controls: measures taken to reduce risk) to protect an asset
defense in depth
25
The primary models are discretionary access control (DAC), mandatory access control (M AC), and nondiscretionary access control.
access control models
26
gives subjects full control of objects they have been given access to, including sharing the objects with other subjects.
discretionary access control (DAC)
27
System enforced access control based on subjects clearance and object's labels.
mandatory access control (M AC)
28
usually focused on preserving the confidentiality of data.
mandatory access control
29
defines how information is accessed on the system based on the role of the subject.
role-based access control (RBAC)
30
A type of nondiscretionary access control because users do not have to discretion regarding the groups of objects they are allowed to access and are unable to transfer text to other subjects.
RBAC
31
another nondiscretionary Access Control model, related to RBAC
task-based access control
32
based on the tasks each subject must perform, such as writing prescriptions, restoring data from backup tape, or opening a helpdesk ticket.
task-based access control
33
uses a series of defined rules restrictions and filters for accessing objects within a system.
rule-based access control system
34
in the form of if/then statements
The rules
35
A proxy firewall that allows users to surf the web with predefined approved content only.
rule-based access control system