Domain 2: Access Control Flashcards
What does “Subject” mean in the Access Control context?
An active entity on an information system
What does “Object”mean in the access control context?
A passive data file
What is Discretionary Access Control (DAC)?
An access control method that gives subjects full control of objects they have been given access to including sharing the objects with other subjects.
What is Mandatory Access Control (MAC)?
It is a method where the system enforces access control based on subject’s clearances and object labels.
What is Role Based Access Control (RBAC)
A type of non-discretionary access control where subjects are given roles and access is granted to roles and not the individual.
What does DAC stand for in the Access Control context?
Discretionary Access Control
What does MAC stand for in the access control context?
Mandatory Access Control
What does RBAC stand for in the Access Control context?
Roles Based Access Control
What is the purpose of Access Control?
To protect the Confidentiality, Integrity, and Availability (CIA) of data.
What does CIA stand for in the Access Control context?
Confidentiality, Integrity, and Availability
Name two access control concerns.
Concern 1: Is the system flexible enough to allow users to run a wide variety of software that is not centrally controlled?
Concern 2: How to manage access control when legacy systems are running mission critical applications?
What are the three elements to the Access Control Triad?
Involves implementing three strong measures:
1: technical
2: physical
3: Administrative
Name three CIA Characteristics in the access control context.
1: All three work together to provide access control.
2: No one of the three is more important than the other two.
3: Every IT system will require a different prioritization of the three depending on the data, the user community and the required timeliness for data access.
Draw the CIA Pyramid
Confidentiality -> Disclosure
Integrity - Alteration
Availability - Destruction
What does DAD stand for in the Access Control context?
Disclosure
Alteration
Destruction
Name three examples of Disclosure from DAD.
1: Unauthorized access to the system
2: The unencrypted transmission of data across an insecure network
3: A trusted user relaying information to an unauthorized user.
Name two kinds of Alteration (DAD)
1: Accidental Alteration of data.
2: Purposeful Alteration of data.
Name on example of Destruction (DAD)
The North Korean scorched earth attack against South Korea.
What does IAAA stand for in the access control context?
Identification and Authentication
Authorization
Accountability
What does Identification mean in the IAAA context?
Identification: A claim by a subject to be somebody.
Name two characteristics of Indentification in the IAAA contex.
1: Must be unique or they cannot be accountable
2: Ideally, user names should not be descriptive: x3345 instead of Richard.howard.
What does Authentication mean in the IAAA context?
Verifying the Identification claim.
What does Authorization mean in the IAAA context?
Allowing the subject access to objects.
What does Accountability mean in the IAAA context?
Establishing the ability to determin which actions each subject performed on a system.