Video Content Lesson 2 Flashcards

2
Q

Access Control

A

Protects data from unauthorized access
2 parts of CIA
Confidentiality - no unauthorized reads
Integrity - no unauthorized writes
Subject is an entity that requests access to data (active)
Object is an entity that contains or controls data (passive)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Least Privilege

A

Grant subjects only enough access to objects to perform required tasks
Goal is to limit “authorization creep”
Accidental authorization can be given to subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accountability

A

Log every access by a subject to an object or group of objects
Ensures subject to adhere to security policy
provides deterrent to unauthorized behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Controls

A

Use Controls as they provide a safeguard to protect an object from a threat
Object Controls are loosely organized into three groups
1-Physical Access Controls
2-Administrative Access Controls
3-Logical Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical Access Controls

A

Controls that limit physical access to hardware
Perimeter Security–fences, walls, limited access rooms, cable protection
shielding from emanations, cabling media choice (fiber optic–NO emanations)
conduit or other physical protection (protect cable)
Separation of duties and work areas–minimize “shoulder surfing”
keep single person from completing a sensitive process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Administrative Access Control

A
Set of rules/strategies
Policies and Procedures
Hiring Practices Policies
Security Awareness Training
Monitoring-validates processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logical Access Control

A

Technical controls
Object access restrictions (only allow access by authorized users)
Encryption (only allow authorized users to read data)
Network architecture/sergregation (use architecture to keep network segments separate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Classification

A

Controls can be expensive
Only protect what must be protected
Data Classification (Identifies valuable data, satisfies legal or regulatory criteria, helps in choosing appropriate controls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Classification Criteria

A

Value or usefulness
Age
Laws and Regulations
Personal association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Responsibility

A

1-Owner (member of middle/upper management and ultimate responsibility for data security)
2-Custodian (responsible for control implementation and maintenance)
3-User (Routinely uses data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Commercial Data (Integrity and Availability)

A

1-Public
2-Sensitive
3-Private
4-Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Government Data (Confidentiality)

A
1-Unclassified
2-Sensitive but Unclassified (SBU)
3-Confidential
4-Secret
5-Top Secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access Control Techniques

A
1-Control Types
2-Control Categories
3-Security Labels
4-Discretionary
5-Mandatory
6-Nondiscretionary
7-Access Control Lists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access Control Types

A
Controls apply to threat events
Preventative (avoid event)
Detective (identify event)
Deterrent (discourage event)
Corrective (fix event)
Recovery (restore)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Control Categories

A

Physical preventative control (badge/access card)
Technical preventative control (Database views, encryption, antivirus software)
Administrative detective control (policy, audit, logs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Security Labels

A

Assign classification levels to objects and subjects
Subject must be at or above clearance level of object
Use of label in table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Discretionary

A

1-Discretionary Access Control (DAC) (identity-based access control, owner specifies who can have access to objects) this is most common access control in commercial arena

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Mandatory

A

2-Mandatory Access Control (MAC) (rule-based access control, subjects clearance compared to objects security level)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Nondiscretionary

A

Role-based access control (access granted based on user’s job description)
Lattice-based access control (both the subject’s role and task to accomplish)
Common in envirionments with frequent personnel changes
Frequently uses access table

21
Q

Access Control Lists

A

Specific about which users can access which objects

can be based on users, roles, or groups

22
Q

Access Control Implementation

A
1-Centralized Authentication
2-RADIUS
3-TACACS
4-Decentralized
5-Hybrid Model
23
Q

Centralized Authentication

A

All access to objects controlled by a single entity
Ease of administration
Allows for strict access control
Can be slower with large number of users
Single point of failure (impact availability)

24
Q

RADIUS

A

Centralized Aunthentication Type (RADIUS)

Remote Authentication Dial-In User Service

25
Q

TACACS

A

Terminal Access Controller Access Control System
Authentication and Authorization for direct access
Only requires single-factor authentication (one piece of input)
TACACS+ Implements two-factor authentication (two pieces of input)

26
Decentralized
Remote authentication Access administration is handled closer to the objects being controlled Requires more administration overhead Security domain (sphere of influence, group of objects that a subject can access, defined by domains)
27
Hybrid Model
Blend Centralized and Decentralized Use Centralized authentication for high security resources, sensitive data, databases Use Decentralized authentication for less sensitive data, local files, etc
28
Identification and Authentication
``` 1-Phases 2-Type 1 Authentication 3-Type 2 Authentication 4-Type 3 Authentication 5-Single Sign-on 6-Kerberos 7-Kerberos Process 8-SESAME ```
29
Phases
Identification | Authentication
30
Type 1 Authentication (what you know)
``` Passwords, PINs, Passphrases Ensure strong passwords with policies Password Length Expiration Date Good Passwords Watch for Mistakes Keep Passwords Secret Don't Reuse Don't Write it ```
31
Type 2 Authentication (what you have)
``` Tokens, Tickets, One-time Password Smart Card producing Time-based password Synchronous / Asynchronous device Used in two-factor authentication more complex user must possess token all of the time ```
32
Type 3 Authentication (who you are)
``` Physical characteristics Iris/Retinal Scan Fingerprint/handprint Voice pattern Keystroke pattern Signature False Rejection Rate (FRR) False Acceptance Rate (FAR) Crossover Error Rate (CER) Lower Crossover Error Rate is BEST ```
33
Single Sign-on
SSO simplifies signon system Once signed into system no need to signin to various systems Kerberos, SESAME, KRYPROKNIGHT, NETSP
34
Kerberos
Started as MIT's project Athena provides authentication and message protection Uses symmetric key cryptography Provides end-to-end security
35
Kerberos
Key Distribution Center (KDC) Holds all cryptographic keys Ticket (geneterated by the KDC to authenticate a subject) Authentication Service for subject and object
36
Kerberos Process
Subject requests access to an object KDC authenticates and generates a ticket Subject validates ticket's origin and sends it to object File server authenticates the subject and grants access to object
37
SESAME
Secure European System for Applications in a Multivendor Environment (SESAME) Uses public key cryptography to distribute secret keys (public and private keys) Privilege Attribute Certificate passes authentication (like Ticket)
38
Attack and Monitor
``` Brute Force Dictionary Denial of Service Spoofing Man-in-the-Middle Access Control Assurance Monitoring Intrusion Detection Penetration Testing ```
39
Brute Force
Attempts to gain access many times using different input | Password guessing and war dialing are examples
40
Dictionary
More selective than a brute force attack | Submits identification credentials from a dictionary, or list of commonly user IDs
41
Denial of Service
attacks availability area of Triad | Attacker saturates network, rendering access to the system impossible or slow
42
Spoofing
Pretending to be someone else Attacker presents a substitute login screen Fake login screen stores the user ID and password, then displays a failed login message
43
Man-in-the-Middle
Uses a network sniffer, or hardware/software that intercepts network packets, to grab traffic en route to another destination
44
Access Control Assurance
The process of ensuring that the access controls are operating the way they were intended Audit trail monitoring Audit event types (network, system, application, user, keystroke) Auditing issues and concerns (where store, enough storage room?, encripted?, who access it?) Information Security Activities Intrusion detection prevention (detects certain activity, raise alert, stop activity) Penetration testing to try to break security Other types of testing (access controls, applications, objects, full testing)
45
Monitoring
Event Log Auditing (system, application, user events) Know system and regular process Keystroke monitoring Honeypot
46
Intrusion Detection
``` Intrusion Detection Systems (IDS) Monitor systems or network 2 Types (Network-based and Host-based) Looks for unusual activity Signature-based and sounds alarms Behavior-based looks for usage anomalies (must keep logs of activities) (sometimes called an expert system) (typically more false positives than signature-based) ```
47
Penetration
Legal Hacking Try to get into network and systems can uncover vulnerabilities Some Pen Tests can be destructive (beware)