Domain 1: Access Control Flashcards

0
Q
Access aggregation security considers are: 
1.
2. 
3.
4.
A
  1. Need for controlled inheritance of all access privileges
  2. Support for separation of duties
  3. Need to maintain the principle of least privilege and monitoring to make sure authorization creep doe snot occur as job roles change.
  4. Need to maintain security of access permissions so that unauthorized individiuals cannot gain access to multiple network resources through single login
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Access Aggregation

A

Combining permissions from a. Single computer or various networked resources so multiple logins not required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Single Sign-On

A

SSO. Requires user to complete the authentication process only once to access multiple applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantages of SSO:

A
  1. logon process efficient
  2. eliminates need for writing down mulitiple passwords on paper. Users can use strong PWs.
  3. System admins can streamline user accoutn management and used centralized control mechanisms
  4. User authentication time reduced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disadvantages of SSO:

A

1 - user granted intiial access to a network can access all organizational resources
2 - if attacker gains access, they can get all resources
3 - difficult to implement because of diverse apps, OS, and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Weaknesses of passwords

A

Easily guessed. Name DOB
broken by programs like crack, SmartPass can decrypt Unix etc PWs
forgotten. Long/ complex. Users write them down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PWs should avoid using:

A
  • common names, DOB, spouse name
  • words found easily in dictionary
  • system default (hackers know)
  • password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Strong PW characteristics

A

8-10 characters
Alphanumeric and special characters
Lower and upper case letters
Difficult to crack but easy doe user to remember.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System admin controls that can be added to fortify

A
Set expiry dates for PWs
Accept only combo alpha and special PWs
Set minimum length
Prevent reuse of old PWs
Track unsuccessful login attempts
Identify weak PWs through auditing and replace.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For access control to be effective an org must have a dedicated _____ who ______.

A

Designated owner who determines appropriate classification and access controls for the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Owner Roles and Responsibilities of Data Owner

A
  1. Classify data and reiew classification categories and accommodate changing business needs
  2. Ensue security controls for the classified data
  3. Review and ensure the owners access rights match the information assets the owner holds
  4. Determine security and backup requirements and access criteria
  5. Perform or delegat approval authority for access requests from other orgs
  6. Delegate bacup and recovery duties
  7. Approve information disclosure
  8. Act on security violation notifications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is responsible for Performing backup to ensure they meet the backup requirements to restore lost data in case of system failure? They also ensure availability of information and and ensure record retention.

A

Data custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the steps to define an effective data management system?

A
  1. Define data as the organizations assets
  2. Delegat local business managers as data owners.
  3. Delegation formation systems personnel as data custodians
  4. Define roles and responsibilities
  5. Determine data classification criteria
  6. Determine controls for each classification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Different types of attacks used agains passwords and password files (5)

A
Brute force
Dictionary
Denial of service
Sniffing
Spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of attack is also known as an exhaustive attack?

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are brute force attacks?

A

PW attacks that involve trying to input different combinations to find a correct PW.

16
Q

How do you reduce brute force attacks?

A
  • ensuring PWs at sufficient length
  • specify a time limit for logging into a particular account
  • lock an account aft specified number of unsuccessful attempts
17
Q

L0phtCrack
Brutus
webCracker are common examples of what kind of attack?

A

brute Force PW attacks

18
Q

What are dictionary attacks?

A

Trying a list of possibly passwords which ar located in a dictionary file or a word list in an attempt to find a valid password.

Frequently these succeed because users often use words that are in the dictionary.

19
Q

How do you prevent dictionary attacks?

A

Ensure use of strong passwords

Use pass phrases instead of words.

20
Q

Crack, John the Ripper, UnSecure, and Brutus are attack programs for what type of attack?

A

dictionary attack

21
Q

What is an example off DoS attack against a password system?

A

Attack on the Remote Authenticaiton Dian in User Service (RADIUS) using Windows NT, Linux, UNIX.

Attacker appends spaces after a username so that the RADIUS system crashes and valid users can’t log on.

22
Q

How do you mitigate DoS PW attacks?

A

Input checkin in the login system.

23
Q

What is a sniffing attack?

A

A program or device monitors data as it travels over a network and capture sensitive information like passwords.

24
Q

How do you mitigate Sniffing Pw attacks?

A

Using a switched infrastructure
OTPs
Enabling encryption

25
Q

What is a spoofing attack?

A

Fake user logon screen is presented to a user who is tricked to prix de a np username and password which then becomes known to the attacker. The program exits and th OS prompts the user for a username and password. The user assumes the initial credential wa rejected due to input error.

26
Q

How to mitigate spoofing attacks

A
  1. Configure he OS to display the number of failed login attacks
  2. Configure th operating system to recognize a guaranteed trusted path between the user and the kernel.

Kernel = part of the Os that handles resource management and memory allocation

27
Q

Strategies for protecting passwords

A
  1. Encrypting passwords before they’re transmitted across a network
  2. Using OTPS tokens
  3. Strong PWs
  4. IDS to detect suspicious behavior
  5. Dictionary cracking tools to find weak passwords
  6. Protecting password files.
28
Q

Access control refers to

A

Purposes of granting or denying user requests for accessing specific resources.

29
Q

Access control process makes it possible for the management of an organization to

A

Specify which objects particular users can access and what those users are permitted to do.

30
Q

Access control model provides

A

Technological frame work for implementing access control.

31
Q

What are th two types of access control models?

A

DAC. Discretionary Access Control

MAC. Mandatory access control.

32
Q

How does the DAC model work?

A

restricts access to objects based on the identiy of the subjects and the groups, like sales and purchases, to which those subjects belong.

Data or resource owner has the discretion either to allow or deny users access to the owned resources like files and printer

33
Q

DAC model features.

A

Access to resources based on user identity and authorization grants to the user.

  • unauthorized users have no access to file characteristics like file name size and directory path.
  • prime users are spectate du and protected from unauthorized data
  • used by Linux Unix, Mac
34
Q

Implement DAC using ______. They contain ______.

A

Access control lists.

They contain identities of the system users who have access to specific resources. You can apply to the file and folders they contain.