module 22 Flashcards
(49 cards)
What does ACL stand for?
access control lists
What is access control lists?
How users receive rights.
Access control or authorization models are generally classed as one of four things. Name them.
- DAC
- RBAC
- MAC
- Rule-based
What does DAC stand for?
Discretionary Access Control
What does RBAC stand for?
Role-based Access Control
What does MAC stand for?
Mandatory Access Control
Access control or authorization models are classified as one of the following (DAC, RBAC, MAC, or Rule-based).
Which is being described below?
This model adds an extra degree of administrative control to the DAC model. Under this model, a set of organization roles are defined and users allocated to those roles. You can see a simple version of this model working in the division of Windows user account types into Administrators and Standard Users.
RBAC
Access control or authorization models are classified as one of the following (DAC, RBAC, MAC, or Rule-based).
Which is being described below?
This model stresses the importance of the owner. The owner is originally the creator of the resource, though ownership can be assigned to another user. The owner is granted full control over the resource, meaning that they can modify its ACL to grant rights to others.
DAC
Access control or authorization models are classified as one of the following (DAC, RBAC, MAC, or Rule-based).
Which is being described below?
This model can refer to any sort of access control model where access control policies are determined by system-enforced rules rather than system users.
Rule-based
Access control or authorization models are classified as one of the following (DAC, RBAC, MAC, or Rule-based).
Which is being described below?
This model is based on the idea of security clearance levels. Rather than defining access control lists on resources, each object and each subject is granted a clearance level, referred to as a label.
MAC
What is non-repudiation?
The principle that the user cannot deny having performed some action.
Name five mechanisms that can be used to provide non-repudiation.
- Logging
- Video
- Biometrics
- Signature
- Receipts
There are five mechanisms that can be used to provide non-repudiation. (logging, video, biometrics, signature, and receipts).
Which of the five is being described below?
Issuing this mechanism with respect to some product or service is proof that a user requested that product and that it was delivered in a timely manner.
Receipt
There are five mechanisms that can be used to provide non-repudiation. (logging, video, biometrics, signature, and receipts).
Which of the five is being described below?
This mechanism can prove that the user was an author of a document (they cannot deny writing it).
Signature
There are five mechanisms that can be used to provide non-repudiation. (logging, video, biometrics, signature, and receipts).
Which of the five is being described below?
Strong authentication can probe that a person was genuinely operating their user account and that an intruder had not hijacked the account.
Biometrics
There are five mechanisms that can be used to provide non-repudiation. (logging, video, biometrics, signature, and receipts).
Which of the five is being described below?
Can record who goes in or out of a particular area.
Video.
User accounts can be assigned directly to security policies, but if there are a large number of users, this can be difficult to manage. How is this made simpler?
group accounts
Widows creates several default accounts. We’re only concerning ourselves with two. What are they?
administrative
standard user
Give three examples of a hardware token (“something you have”).
smart card
USB fob
SecureID token
What does GPS stand for?
global positioning system
What does IPS stand for?
Indoor Positioning System
Authentication is the process of ensuring that each account is only operated by its proper user. There are many different authentication technologies. Name four
- something you know
- something you have
- something you are
- somewhere you are
Give an example of something you know.
password
Give an example of something you have.
authentication device