03 Technical Network Security Flashcards

1
Q

Access Control

A

Selective restriction of access to a network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control Mechanisms use:

A

user identification, authentication and authorization to restrict or grand access to a specific user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Subject:

A

a particular user or process that wants to access a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Object:

A

a specific resource that the users wants to access such as a file or a hardware device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reference Monitor:

A

checks the access control rule for specific restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operation:

A

represents an action taken by a subject on an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Principles of Access Control:

A
  • Separation of Duties (SoD)
  • Need-to-know
  • Principle of Lease Privilege (POLP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Principles of Access Control: SoD:

A

Separation of Duties (SoD):

Conflicting responsibilities create unwanted risks such as security breaches, info theft, and circumvention of security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Principles of Access Control: need-to-know:

A

Under the need-to-know access control principle, access is provided only to the info that is required for performing a specific task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Principles of Access Control: POLP

A

Principle of Least Privilege (POLP):

  • POLP believes in providing employees a need-to-know access, not more not less.
  • Helps orgs by protecting it from malicious behavior, achieving better system stability and system security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Control Model:

A
  • Mandatory Access control (MAC)
  • Role-based access control (RBAC)
  • Discretionary Access Control (DAC)
  • Rule-based access control (RB-RBAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Control Model: MAC

A
  • Only the admin/system owner has the rights to assign privileges.
  • Does not permit end user to decide who can access the information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access Control Model: RBAC

A

Role-based Access Control (RBAC)

-Permission is assigned based on user roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access Control Model: DAC

A

Discretionary Access Control (DAC)

End user has complete access to the information they own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access Control Model: RB-RBAC

A

Rule-based access control (RB-RBAC)

-Permissions are assigned to a user role dynamically based on a set of rules defined by the admin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two types of MAC models:

A
  • Bell-LaPadula (BLM)

- Biba Integrity Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DAC Model: Access Control Matrix

A

Access control matrix is a two-dimensional array in which subjects are placed against the objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BLM Model

A

Bell-LaPadula Model (BLM)

  • Focuses on data confidentiality and controlled access to classified information.
  • This model believes in read-down, write-up.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Biba Integrity Model:

A

-Exact opposite of BLM model: read-up OK, write-down OK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Biba Integrity Model: 3 data integrity axioms

A
  1. : Prevent data modification by unauthorized parties
  2. : prevent unauthorized data modification by authorized parties
  3. : maintain internal and external consistency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DAC Model: Access Control Matrix

A

Access control matrix is a two-dimensional array in which subjects are placed against the objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RBAC Implementation:

A

-Just Enough Administration (JEA): Restricts logon rights of IT administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Zero Trust Network Model:

A
  • Never Trust, Always Verify

- Zero trust model states that no one is trusted by default, whether you are inside or outside the network.

24
Q

Zero Trust Network Model: Identity Verification

A
  • The user/device must access the network in a secure manner regardless of location.
  • AC must be implements on a need-to-know basis.
  • Network traffic must be inspected and logged.
  • Network must be broken down into a number of smaller segments and each segment enforced with individual access requirements.
25
IAM:
Identity and Access Management (IAM)
26
IAM is responsible for:
- providing the right individual with right access at the right time. - Access Management: authentication, authorization, identity management, identity repository.
27
IDM:
User Identity Management - User identifications ensure that an individual holds a valid identity. - Ex: username, account number, user roles etc.
28
IDM: Identity Repository
The user repo is a database where attributes related to the user's identities are stored.
29
AM:
Access Management
30
5 Types of Authentication:
- Password Auth - Smart Card Auth - Biometric Auth - Two factor Auth - Single Sign-n Auth (SSO)
31
Password Auth:
- combo of username/passowrd | - Vulnerable to password cracking such as brute force or dictionary attacks.
32
Smart Card Authentication:
Token RFID
33
6 types of Biometric authentication:
- Fingerprint scanning: ridges and furrows on the surface of a finger which are unique to each person are used for identifying them. - Retinal Scanning: a person is identified by analyzing the layer of blood vessels at the back of their eyes. - Iris Scanning: The colored part of the eye suspended behind the cornea is analyzed. - Vein structure recognition: thickness and location of veins are analyzed to identify a person. - Face recognition: uses facial features to identify or verify a person. - Voice Recognition: voice patters to identify/verify a person.
34
Two Factor Auth:
-using two different auth factors out of 3 (something you know, something you have, and something you are) to verify the identity of an individual.
35
EX of combo of two fac auth:
- password + smart card/token - password + biometrics, -password + one time password (OTP), -smart card + biometrics.
36
Best companion of Two Fac Auth, and is hardest to forge or spoof:
Something you are is the best companion for two fac auth (biometrics)
37
SSO:
Sing Sign-on Auth (SSO) -Allows a user to auth themselves to multiple servers on a network with a single password without reentering it every time.
38
Advantages of SSO:
- user needs to enter credentials once for multiple application - no need to remember multiple passwords, - reduces the time for entering user/pass, - reduces network traffic to the centralized server,
39
Authorization:
involves controlling access of information for an individual (ex: user can only read a file, but not write in it or delete it)
40
4 Types of Authorization Systems:
- Centralized Authorization - Decentralized Authorization - Implicit authorization - Explicit authorization
41
Types of authorization systems: Centralized
- Network access auth is done using a single centralized authorization unit. - Maintains a single database for authorizing all the network resources or applications. - Easy and inexpensive authorization approach.
42
Types of authorization systems: Decentralized
- Each network resource maintains its authorization unit and performs authorization locally. - It maintains its own database for authorization.
43
Types of Authorization systems: Implicit
- Users can access the requested resource on behalf of others. - The access request goes through a primary resource to access the requested resource.
44
Types of Authorization: Explicit
- Unlike implicit authorization, explicit authorization requires separate authorization for each requested resource. - It explicitly maintains authorization for each requested object.
45
Accounting:
- Is a method of keeping track of user actions on the network. - Keeps track of Who, when, and how.
46
2 types of encryption:
1. symmetric, | 2. asymmetric.
47
Symmetric encryption:
- Oldest technique used for encrypting digital data. - Is called a symmetric encryption since a single key is used for encrypting and decrypting the data. - Is used to encrypt large amounts of data.
48
Asymmetric Encryption:
-Uses two separate keys. --Public key: used for encrypting messages. --Private key: decrypting messages. -Also called public key encryption, is used to encrypt small amounts of data.
49
Hashing:
Form of cryptography that transforms the info into a fixed-length value or a key that represents the original info.
50
Hashing ensures the security of information by:
-checking the integrity of the info on both the sender and receiver sides. Checking the integrity of info: - Sender of message creates a hash code of it and sends the message to the receiver along with its hash code. - The receiver again creates a hash code for the same message at the receiver side and compares both the hash codes. If both hash codes match, the message has not been tampered with.
51
Digital signature:
- Uses the asymmetric key algorithm to provide data integrity. - A digital signature is created using the hash code of the message, the private key of the sender, and the signature function. - It is then verified using the hash code of the message, the public key of send, and the verification function.
52
10 Digital Signature Attributes:
- Serial number: Unique certificate identity - Subject: represents owner of the certificate - Signature algorithm: states the name of the algorithm. - Key-usage: specifies the purpose of the public key. - Public-Key: used for encrypting a message or verifying the signature of the owner. - Issuer: provides the identity of the intermediary who issued the cert. - Valid From: denotes the date from which the cert is valid. - Valid to: denotes the date till which the cert is valid. - Thumbprint algorithm: specifies the hashing algorithm used. - Thumbprint: specifies the hash value for the certificate.
53
PKI:
Public Key Infrastructure
54
PKI is a set of:
hardware, software, people, policies and procedures required for creating, managing, distributing, using, storing, and revoking digital certs.
55
Components of PKI:
- A certificate authority (CA) that issues and verifies digital certs. - A registration authority (RA) that acts as the verifier for the CA. - A cert management system for generating, distributing, storage, and verification of certificates.
56
DES:
Data Encryption Standard is: symmetric encryption
57
AAA:
authentication, authorization, and accounting