Lesson 8 - Implementing Identity and Account Management Controls Flashcards

(41 cards)

1
Q

The process of bringing in a new employee, contractor, or supplier.

A

Onboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An agreement that stipulates that entities will not share confidential information, knowledge, or materials with unauthorized third parties.

A

nondisclosure agreement (NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A concept that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers.

A

Separation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The policy of preventing any one individual performing the same role or tasks for too long. This deters fraud and provides better oversight of the person’s duties.

A

Job Rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The principle that states when and how long an employee must take time off from work so that their activities may be subjected to a security review.

A

Mandatory Vacation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of ensuring that all HR and other requirements are covered when an employee leaves an organization.

A

An exit interview (or offboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A collection of user accounts that are useful when establishing file permissions and user rights because when many individuals need the same level of access.

A

a security group account
a group could be established containing all the relevant users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Default administrative and guest accounts configured on servers and network devices are possible points of unauthorized access.

A

default account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A host or network account that is designed to run a background service, rather than to log on interactively.

A

Service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The value assigned to an account by Windows and that is used by the operating system to identify that account.

A

Security Identifier (SID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.

A

Group Policy Objects (GPOs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A set of rules governing user security information, such as password expiration and uniqueness, which can be set globally.

A

Account policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The identification or estimation of the physical location of an object, such as a radar source, mobile phone, or Internet-connected computing device.

A

Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The practice of creating a virtual boundary based on real-world geography.

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The addition of location metadata to files or devices.

A

Geotagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Policies or configuration settings that limit a user’s access to resources.

A

Time of day policy

18
Q

An employee who gains more and more access privileges the longer they remain with the organization.

A

Authorization Creep

19
Q

If a user has moved to a new job, old privileges may need to be revoked and new ones granted.

A

Recertification

20
Q

Security settings that control access to objects including file system items and network resources.

21
Q

Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner (or owners).

A

Discretionary Access Control (DAC)

22
Q

An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.

A

Role-Based Access Control (RBAC)

23
Q

Each record in the ACL is called an access control

A

ACE
ACLs can be enforced by a file system that supports permissions, such as NTFS, ext3/ext4, or ZFS.

24
Q

Linux command for managing file permissions.

25
Access control model where resources are protected by inflexible, system defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).
Mandatory Access Control (MAC)
26
An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.
Attribute-Based Access Control (ABAC)
27
A non-discretionary access control technique that is based on a set of operational rules or restrictions to enforce a least privileges permissions policy.
Rule-Based Access Control (RBAC) As such, RBAC, ABAC, and MAC are all examples of rule-based (or non-discretionary) access control.
28
Policies, procedures, and support software for managing accounts and credentials with administrative permissions.
Privileged access management (PAM)
29
A network service that stores identity information about all the objects in a particular network, including users, groups, servers, client computers, and printers.
Directory Services The Lightweight Directory Access Protocol (LDAP) is a protocol widely used to query and update X.500 format directories.
30
A unique identifier for any given resource within an X.500-like directory.
Distinguished Name
31
A process that provides a shared login capability across multiple systems and enterprises. It essentially connects the identity management services of multiple systems.
Federation
32
In a federated network, the service that holds the user account and performs authentication.
Identity Provider (IdP)
33
An XML-based data format used to exchange authentication information between a client and a service.
Security Assertions Markup Language (SAML)
34
An XML-based web services protocol that is used to exchange messages.
Simple Object Access Protocol (SOAP)
35
Standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider.
OAuth
36
An authentication layer that sits on top of the OAuth 2.0 authorization protocol.
OpenID Connect (OIDC) OAuth is explicitly designed to authorize claims and not to authenticate users. OpenID uses XML-format messaging and supports only web applications and not mobile apps.
37
A policy that governs employees' use of company equipment and Internet services. ISPs may also apply AUPs to their customers.
Acceptable Use Policy
38
Professional behavior depends on basic ethical standards, such as honesty and fairness. Some professions may have developed codes of ethics to cover difficult situations; some businesses may also have a code of ethics to communicate the values it expects its employees to practice.
Code of Conduct
39
An organizational policy that mandates employee work areas be free from potentially sensitive information; sensitive documents must not be left out where unauthorized personnel might see them.
Clean Desk Policy
40
Training event where learners must identify a token within a live network environment.
Capture the Flag (CTF)
41
Computer-Based Training (CBT)