Logical Access Controls Flashcards

1
Q

Define “biometric controls”.

A

A physical characteristic is used to gain access instead of a password. Common choices for biometrics controls include fingerprint or thumbprint, retina patterns, and voice print patterns. Biometric controls can be very reliable but generally require special input equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are “one-time” passwords used by organizations?

A

They provide an additional level of authentication. Used to strengthen the standard password by requiring access to a physical device which displays a new “one-time password” every 30-60 seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why does multi-factor authentication increase control?

A

All authentication techniques may fail. Requiring multi-factor authentication procedures - the use of several separate authentication procedures at one time (e.g., user name, password, one-time password and fingerprint) enhances the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the operation of “one-time” passwords.

A

The “one-time” password derives from an algorithm which usually involves the date and time. The user enters this password along with their user name and personal password. Once received, the computer independently recalculates the “password”. If the entered value and computed value are the same, the computer then recognized the individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe smart cards and identification badges.

A

These have identification information embedded on a magnetic strip on the card and require the use of additional hardware (a card reader) to read the data into the system. Depending on the system, the user may only need to swipe the card to log onto the system, or may need to key in other information in order to log on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a firewall?

A

A firewall consists of hardware, or software, or both, that help detect security problems and enforce security policies on a computer system. Like a door with a lock for a computer system. There are multiple types, and levels, of firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe some characteristics of a “strong” (i.e., good) password.

A

At least eight characters long; uses both upper and lower case letters; uses at least one numeral; uses at least one special character; must be periodically changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List some examples of security tokens.

A

Includes (1) devices which provide “one-time” passwords that must be input by the user and (2) “smart cards” that contain additional user identification information and must be read by an input device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are logical access controls?

A

Control electronic access to systems via internal and external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly