Chapter 3 Flashcards

(28 cards)

1
Q

is a safeguard or countermeasure designed to preserve Confidentiality, Integrity and Availability of data.

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

involves limiting what objects can be available to what subjects according to what rules.

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

it is the heart of an information security program

A

access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is a user, a process, a procedure, a client (or a server), a program, a device such as an endpoint, workstation, smartphone or removable storage device with onboard firmware.

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a device, process, person, user, program, server, client or other entity that responds to a request for service.

A

object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is an instruction developed to allow or deny access to an object by comparing the validated identity of the subject to an access control list.

A

access rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describes an information security strategy that integrates people, technology and operations capabilities to establish variable barriers across multiple layers and missions of the organization.

A

defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a standard of permitting only minimum access necessary for users or programs to fulfill their function.

A

principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

are those with permissions beyond those of normal users, such as managers and administrators.

A

Privilege Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is based on the security practice that no one person should control an entire high-risk transaction from start to finish.

A

Segregation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It breaks the transaction into separate parts and requires a different person to execute each part of the transaction.

A

Segregation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a security strategy that requires a minimum of two people to be in an area together, making it impossible for a person to be in the area alone.

A

Two-person integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

are items you can physically touch. They include physical mechanisms deployed to prevent, monitor, or detect direct contact with systems or areas within a facility.

A

Physical access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

it is produced and issued with the employee’s identifiers, with the enrollment station giving the employee specific areas that will be accessible.

A

Badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two processes of biometrics

A
  1. enrollment
  2. verification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

measure the characteristics of a person such as a fingerprint, iris scan (the colored portion around the outside of the pupil in the eye), retinal scan (the pattern of blood vessels in the back of the eye), palm scan and venous scans that look for the flow of blood through the veins in the palm.

A

physiological systems

17
Q

Two primary forms of Biometrics

A
  1. Physiological systems
  2. Behavioral systems
18
Q

measure how a person acts by measuring voiceprints, signature dynamics and keystroke dynamics. As a person types, a keystroke dynamics system measures behavior such as the delay rate (how long a person holds down a key) and transfer rate (how rapidly a person moves between keys).

A

Behavioral systems

19
Q

The use of physical access controls and monitoring personnel and equipment entering and leaving as well as auditing/logging all physical events are primary elements in maintaining overall organizational security.

20
Q

are normally integrated into the overall security program and centrally monitored.

21
Q

They are designed to alert the appropriate personnel when a door or window is opened unexpectedly.

A

alarm systems

22
Q

it is a record of events that have occured.

23
Q

are essential to support business requirements.

A

Physical security logs

24
Q

are an effective physical security control. No matter what form of physical access control is used, a security guard or other monitoring system will discourage a person from masquerading as someone else or following closely on the heels of another to gain access.

A

security guards

25
what are the types of logical access controls?
Passwords Biometrics Badge/Token readers connected to a system
26
Is a specific type of access control policy that is enforced over all subjects and objects in an information system. In DAC, the policy specifies that a subject who has been granted access to information can do one or more
Discretionary Access Control (DAC)
27
is one that is uniformly enforced across all subjects and objects within the boundary of an information system.
Mandatory Access Control (MAC) policy
28
it sets up user permissions based on roles.
Role-Based Access Control (RBAC)