Domain 1 Access Control Vocab Flashcards
(142 cards)
Discretionary access control
gives subjects full control of objects they have been given access to, including sharing the objects with other subjects.
Mandatory access control
system enforced access control based on subject’s clearances and object’s labels.
Role-based access control
subjects are grouped into roles, and each defined role has access permissions based upon the role, not the individual.
CIA Triad
confidentiality, integrity, and availability.
Confidentiality
seeks to prevent the unauthorized disclosure of information; it keeps data secret. In other words, confidentiality seeks to prevent unauthorized read access to data.
Integrity
seeks to prevent an authorized modification of information. In other words, integrity seeks to prevent unauthorized write access to data. There are two types of integrity: data integrity and system integrity. Data integrity seeks to protect information against unauthorized modification; system integrity seeks to protect a system such as Windows 2008 server operating system from unauthorized modification.
Availability
ensures that information is available when needed. Systems need to be usable for normal business use. An example of an attack on availability would be a denial of service attack.
DAD
Disclosure, Alteration, and Destruction. The opposing force to the CIA Triad.
AAA
Authentication, Authorization, and accountability. Identification is understood with all three.
Subjects, objects, access permissions
Three important access control concepts.
Subjects
Entities that may be assigned permissions.
Objects
Types of resources that subjects may access.
Access permissions
Relationships between subjects and the objects they may access.
Four phases of access control.
Identification, authentication, authorization, accounting
Identification
User makes a claim as to his or her identity.
Authentication
User proves his or her identity using one or more mechanisms. Providing an identity claim.
Authorization
System makes decisions about what resources the user is allowed to access and the manner in which they may be manipulated. Allowing authenticated subjects access to a system
Accountability
System keeps an accurate audit trail of the users activity.
Non-Repudiation
a user cannot deny (repudiate) having performed a transaction. Authentication with integrity
Defense in Depth or Layered Defense
applies multiple safeguards or controls to protect an asset. Multiple controls will increase your chances of security.
Subject
an active entity on an information system.
object
a passive data file.
Three types of access control models
MAC, DAC, NDAC (RBAC),
Mandatory access control (MAC)
Authorization of the subjects access to an object depends on labels which indicate a subjects clearance and the classification or sensitivity of the related object