Week 2 Flashcards

(20 cards)

1
Q

What are the three main authentication factors?

A

Something you know; Something you have; Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give an example of each authentication factor.

A

Know: Password/PIN; Have: Smart card/Token;
Are: Fingerprint/Iris scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List two common password vulnerabilities.

A

Too short or dictionary words; Written down and reused across systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is social engineering in the context of passwords?

A

Manipulating people into revealing password (e.g., phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does locking out after three failed password attempts protect - and harm - security?

A

Prevents guessing attacks but can enable denial-of-service by lockout.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two recommendations from NCSC’s password guidance.

A

Reduce reliance on user recall; Implement technical solutions (e.g. password managers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define “Authentication” vs “Authorization”.

A

Authentication: Verifying Identity claimed;
Authorization: Granting access rights based on that identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does “Accounting” ensure in access control?

A

That user activities can be tracked back to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe “Mandatory Access Control (MAC)”

A

OS-enforced policy using security labels; users cannot override

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Discretionary Access Control (DAC) matrix?

A

Owner-defined rights matrix; often implemented via ACLs or capability lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a Capability List differ from an Access Control List?

A

Capability list attaches rights to subjects (rows); ACL attaches rights to objects (columns).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Summarize the Bell-LaPadula model.

A

“No read up, no write down” for confidentiality enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Summarize the Biba integrity model.

A

“No write up, no read down” to prevent integrity violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the Clark-Wilson model enforce?

A

Separation of duties and well-defined transactions to maintain internal & external consistency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Role-Based Access Control (RBAC).

A

Permissions assigned to roles; users acquire permissions by role membership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the Attribute-Based Access Control (ABAC) extend RBAC?

A

Uses arbitrary user, resource, and environment attributes rather than just roles.

17
Q

What requirements must a biometric trait meet?

A

Universality; Distinctiveness; Persistence; Collectability; Performance; Acceptability; Resistance to Circumvention

18
Q

Explain False Accept Rate (FAR) and False Reject Rate (FRR)

A

Far: % of imposters accepted;
FRR: % of genuine users rejected

19
Q

Why must privileged (sysadmin) access be tightly controlled?

A

Privileged accounts can modify system, erase logs, grant rights - high risk of misuse or error.

20
Q

What are the four access control fundamentals?

A

Identity: Authentication; Authorization; Accounting (plus Audit & Compliance)