Unit 5: Access Controls Flashcards

(40 cards)

1
Q

Process of Protecting a Resource so that it used by only those allowed use it. Methods to restrict and allow access to certain items. (Codes, Keys, Passwords, Fingerprints, Combinations).

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of deciding how has access to what computer and network resources. Based on job roles, background screening, and any gov. requirements.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assigns privileges at a user level. Very difficult to manage since every person has unique privileges. Very detailed and controlling

A

User-Based Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Assigns privileges based on group policy. Easy to manage since assigning a person to a group automatically gives them those privileges (Student group)

A

Group-Based Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Set of rules that allows a special group for users to perform a set of actions on a set of resources

A

Access Control Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

People/Processes that use the system & perform some services

A

Users/Subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protected Objects in the system. This can be accessed only buy authorized subjects(users). This can only be used in authorized ways.

A

Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Activities that authorized users can perform on the resources

A

Actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Permissions granted to an authorized user, such as to read, write, execute

A

Relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These controls can control access to physical resources. (Parking Lots, protected areas)

A

Physical Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These controls can control access to a computer system/network

A

Logical Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This asks the question ‘Who is asking to access the asset?’

A

Identificaiton

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This asks the question ‘Can the requestor’s ID be verified?’

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This asks the question ‘What exactly can the requestor access and do?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This asks the question ‘How can the actions be traced to the individual, and what methods are in place to track the actions of users?’

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common ID method through smart card, key FOB automatically.

A

Username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Uses Physical Traits of the User (Fingerprints, Voice, facial recognition.)

18
Q

Account policies should PROHIBIT this to allow for attribution of Actions

A

General/Guest Accounts and Account Sharing.

19
Q

Authentication type that is Something the User Knows (Passwords, Passphrase, pin# etc.)

20
Q

Disables the ability to login after a set amount of consecutive failed attempts. (Prevents Brute Force/Dictionary Attacks)

A

Lockout Policy

21
Q

Authentication type that is something the user has. (Smart Card, FOB, Badge, etc.)

22
Q

An algorithm that calculates a number on both the authentication server & the device held by the user. User would then enter the number on the device, and it would be compared to the server for authentication

A

Synchronous Token

23
Q

Authentication type that is Something the User Is (Physical Attributes, Fingerprints, Optical/Facial Recognition)

A

Characteristics

24
Q

Measures various parts of a person’s anatomy/physical activities.

25
Fingerprints, Iris, Facia, Retina
Static Biometrics
26
Handwriting, Voice pattern, keyboard usage
dynamic biometrics.
27
Advantages of Biometrics
Person must physically be present to authenticate Nothing to Remember Hard to Fake/Forge
28
Disadvantages of Biometrics
Physical Characteristics may change. Physical Disabilities may cause problems. Often Slow and Expensive
29
Authentication type that is Somewhere the user is(Buildings, etc.)
Location
30
Authentication type that is Something that the user can do. (Handwriting, typing, style of word choice, etc.)
Action
31
Allows a user to login to a computer/network once, then allows the user to access all authorized computers/applications. (Facebook/Cellphone App.) Encourages a single strong password to prevent having to remember too many, but if you lose one account, you lose access to all
Single Sign-On (SSO)
32
Tracing an Action to a person/process to know who/what made a change to a system/data (Log Files are key...) (Logs record who logged into a system/data accessed, when they logged in, and what info/resource they used.)
Accountability
33
Lists (Files) which track the user, files, and permissions
Access Control List (ACL)
34
Each User has access control over their own data. Creator = Owner. (Controls permission to access objects). Default for most OS, File Ownership allows full control. Very Flexible but not as secure due to possible inheritance of permissions. Uses ACL to track File permissions
Discretionary Access Control (DAC)
35
Used in orgs. that require an elevated emphasis on confidentiality & classification of Data. (GOVT/Military). Strictest Level of Control & Hardest to maintain, Users have no control over classification of data. Objects/Resources must be labeled with a classification (Secret, Top Secret, Classified, etc.), Users must individually be authorized to access a certain level classification based on clearance.
Mandatory Access Control (MAC)
36
System admin assigns privileges to a JOB Title/Position rather than a person. (Group Level. Employees are only allowed to access the info necessary to effectively perform their duties. Lower-level employees do not have access to sensitive data if they don't need it to fulfill their responsibilities. Helpful if there are many employees & use 3rd party contractors that make it difficult to closely monitor network access
Role-Based Access Control.
37
Indicates a subjects rights to a system/application/network/resource/etc. In a DAC Environment, the authorization system uses this to determine what objects any subject can access.
Permission Levels
38
Permission Levels based on a specific user (hard to maintain)
User-Based Permission Levels
39
Permission Levels based on common group/specific job role a person is assigned.
Job/Group/Role Based Access Controls
40