Week 10 - Systems Security Flashcards

(30 cards)

1
Q

Achieving the security of CIA and non-repudiation depends on?

A

Authentication - identity to entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware is?

A

intrusive software designed to damage or take control of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NCSC - reduce reliance on passwords

A

use single sign on (SSO) - ues MFA to check identity then grants a token that can be used instead of password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NCSC -implement technical solutions

A

use controls such as max number of authentication attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NCSC - protect all password

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NCSC - password overload

A

human factor, password management systems, good practices and against password expiry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NCSC - help generate better passwords

A

use machine generated passwords, or “three random words”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NCSC - training

A

provide guidance and advice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS is?

A

Denial of service, high level of requests over a network which floods the machine/network, responses fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

combination of authentication and authorisation is?

A

access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access control list (ACL)

A

a list of who has authorisation to communicate with whom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Specifying authorisation rules, terms used?

A

subject entity

object the asset on which the operation is being performed

action the operation being attempted

permission allowed or denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

two key security properties that authorisation enables in a system:

A

least privilege
authorisation to perform minimal set of operations to complete function

separation of privileges
separation of duties so that no 1 employee is given enough privilege to misuse the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mandatory access control (MAC)?

A

Access to resources is strictly controlled by the operating system (OS) as specified by the system administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advantages of MAC?

A

high level security, every subject and object has sensitivity label with NWU and NRD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disadvantages of MAC?

A

large surface area, human error with assigning labels, wrong input gives access to unauthorised personnel or denies access to correct entity

high admin and maintenance costs

17
Q

Discretionary Access Control (DAS)?

A

widely used, subjects set access control on objects they own. based on trust

18
Q

DAC -permissions?

A

grants entities the right to read, write or execute object

19
Q

DAC - read?

A

abrv - (r) open make no changes

20
Q

DAC - write

A

abrv - (w) make changes

21
Q

DAC - execute

A

abrv - (x) run a program

22
Q

Advantages of DAC?

A

easy to implement, users gives permissions and security

23
Q

Disadvantages of DAC?

A

lack of accountability, difficult to execute in larger settings, not good for limited access permissions

24
Q

Role based access controls (RBAC)

A

users assigned roles, object accessing by user with appropriate roles

25
advantages of RBAC?
sets roles across and organisation, users automatically assigned the correct transactions once in a roles, users cannot receive permissions outside of role.
26
disadvantages of RBAC?
creating roles more difficult than DAC, role explosion (creating more roles if not checked).
27
Reference monitor?
enforces access control rules, if not rules - default is applied.
28
three main types of accountability?
**non-repudiation** cannot deny **digital forensics** traces in the log, logs of interacting entities **compliance** erating in accordance with the relevant standards, regulations, or internal policies.
29
GDPR?
general data protection regulation privacy and security law, what personal information can be collected, regulates how data is processed or stored
30
Accountability challenges ?
volume of logs,