lecture 3b Flashcards
(50 cards)
What are the two broad areas into which cybersecurity incidents can be classified?
Weak account types and poor access control
What should be required on all user accounts to prevent weak account types?
Strong authentication
What should be routinely reviewed for security to prevent cybersecurity incidents?
User accounts
Which types of accounts should be prohibited to avoid cybersecurity incidents?
Shared account Generic account Guest account
What is access control?
Granting or denying approval to use specific resources
What does physical access control consist of?
Fencing hardware door locks and mantraps
What does technical access control consist of?
Technology restrictions that limit computer users from accessing data
What is identification in access control concepts?
The process of recognising and distinguishing the user from any other user
What is authentication?
Checking the credentials of a user
What is authorization?
Granting permission to take action
What does accounting record in access control?
Who accessed the network what resources they accessed and when they disconnected
In access control terminology what is an object?
A specific resource like a file or hardware device
In access control terminology what is a subject?
A user or process functioning on behalf of a user
What is an operation in access control?
The action taken by the subject over an object like deleting a file
What are access control schemes?
Standards that provide a predefined framework for hardware or software developers
Name the five major access control schemes.
Discretionary Access Control Mandatory Access Control Role Based Access Control Rule Based Access Control Attribute-Based Access Control
What is a key characteristic of Discretionary Access Control (DAC)?
It is the least restrictive scheme where owners have total control over their objects
What is a weakness of DAC?
It relies on the end user to set proper security and permissions are inherited by executed programs
What is Mandatory Access Control (MAC)?
The most restrictive access control model where users cannot set controls or distribute access
What two key elements does MAC use?
Labels and Levels
What access control model is called Non-Discretionary Access Control?
Role-Based Access Control (RBAC)
How does RBAC assign permissions?
Based on the user’s job function assigned to roles
What is Rule-Based Access Control?
Access is dynamically assigned based on rules defined by a custodian
What kind of policies does Attribute-Based Access Control (ABAC) use?
Flexible policies combining object subject and environment attributes