03 Technical Network Security Flashcards

1
Q

Access Control

A

Selective restriction of access to a network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control Mechanisms use:

A

user identification, authentication and authorization to restrict or grand access to a specific user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Subject:

A

a particular user or process that wants to access a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Object:

A

a specific resource that the users wants to access such as a file or a hardware device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reference Monitor:

A

checks the access control rule for specific restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operation:

A

represents an action taken by a subject on an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Principles of Access Control:

A
  • Separation of Duties (SoD)
  • Need-to-know
  • Principle of Lease Privilege (POLP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Principles of Access Control: SoD:

A

Separation of Duties (SoD):

Conflicting responsibilities create unwanted risks such as security breaches, info theft, and circumvention of security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Principles of Access Control: need-to-know:

A

Under the need-to-know access control principle, access is provided only to the info that is required for performing a specific task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Principles of Access Control: POLP

A

Principle of Least Privilege (POLP):

  • POLP believes in providing employees a need-to-know access, not more not less.
  • Helps orgs by protecting it from malicious behavior, achieving better system stability and system security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Control Model:

A
  • Mandatory Access control (MAC)
  • Role-based access control (RBAC)
  • Discretionary Access Control (DAC)
  • Rule-based access control (RB-RBAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Control Model: MAC

A
  • Only the admin/system owner has the rights to assign privileges.
  • Does not permit end user to decide who can access the information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access Control Model: RBAC

A

Role-based Access Control (RBAC)

-Permission is assigned based on user roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access Control Model: DAC

A

Discretionary Access Control (DAC)

End user has complete access to the information they own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access Control Model: RB-RBAC

A

Rule-based access control (RB-RBAC)

-Permissions are assigned to a user role dynamically based on a set of rules defined by the admin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two types of MAC models:

A
  • Bell-LaPadula (BLM)

- Biba Integrity Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DAC Model: Access Control Matrix

A

Access control matrix is a two-dimensional array in which subjects are placed against the objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BLM Model

A

Bell-LaPadula Model (BLM)

  • Focuses on data confidentiality and controlled access to classified information.
  • This model believes in read-down, write-up.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Biba Integrity Model:

A

-Exact opposite of BLM model: read-up OK, write-down OK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Biba Integrity Model: 3 data integrity axioms

A
  1. : Prevent data modification by unauthorized parties
  2. : prevent unauthorized data modification by authorized parties
  3. : maintain internal and external consistency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DAC Model: Access Control Matrix

A

Access control matrix is a two-dimensional array in which subjects are placed against the objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RBAC Implementation:

A

-Just Enough Administration (JEA): Restricts logon rights of IT administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Zero Trust Network Model:

A
  • Never Trust, Always Verify

- Zero trust model states that no one is trusted by default, whether you are inside or outside the network.

24
Q

Zero Trust Network Model: Identity Verification

A
  • The user/device must access the network in a secure manner regardless of location.
  • AC must be implements on a need-to-know basis.
  • Network traffic must be inspected and logged.
  • Network must be broken down into a number of smaller segments and each segment enforced with individual access requirements.
25
Q

IAM:

A

Identity and Access Management (IAM)

26
Q

IAM is responsible for:

A
  • providing the right individual with right access at the right time.
  • Access Management: authentication, authorization, identity management, identity repository.
27
Q

IDM:

A

User Identity Management

  • User identifications ensure that an individual holds a valid identity.
  • Ex: username, account number, user roles etc.
28
Q

IDM: Identity Repository

A

The user repo is a database where attributes related to the user’s identities are stored.

29
Q

AM:

A

Access Management

30
Q

5 Types of Authentication:

A
  • Password Auth
  • Smart Card Auth
  • Biometric Auth
  • Two factor Auth
  • Single Sign-n Auth (SSO)
31
Q

Password Auth:

A
  • combo of username/passowrd

- Vulnerable to password cracking such as brute force or dictionary attacks.

32
Q

Smart Card Authentication:

A

Token RFID

33
Q

6 types of Biometric authentication:

A
  • Fingerprint scanning: ridges and furrows on the surface of a finger which are unique to each person are used for identifying them.
  • Retinal Scanning: a person is identified by analyzing the layer of blood vessels at the back of their eyes.
  • Iris Scanning: The colored part of the eye suspended behind the cornea is analyzed.
  • Vein structure recognition: thickness and location of veins are analyzed to identify a person.
  • Face recognition: uses facial features to identify or verify a person.
  • Voice Recognition: voice patters to identify/verify a person.
34
Q

Two Factor Auth:

A

-using two different auth factors out of 3 (something you know, something you have, and something you are) to verify the identity of an individual.

35
Q

EX of combo of two fac auth:

A
  • password + smart card/token
  • password + biometrics,

-password + one time
password (OTP),

-smart card + biometrics.

36
Q

Best companion of Two Fac Auth, and is hardest to forge or spoof:

A

Something you are is the best companion for two fac auth (biometrics)

37
Q

SSO:

A

Sing Sign-on Auth (SSO)

-Allows a user to auth themselves to multiple servers on a network with a single password without reentering it every time.

38
Q

Advantages of SSO:

A
  • user needs to enter credentials once for multiple application
  • no need to remember multiple passwords,
  • reduces the time for entering user/pass,
  • reduces network traffic to the centralized server,
39
Q

Authorization:

A

involves controlling access of information for an individual (ex: user can only read a file, but not write in it or delete it)

40
Q

4 Types of Authorization Systems:

A
  • Centralized Authorization
  • Decentralized Authorization
  • Implicit authorization
  • Explicit authorization
41
Q

Types of authorization systems: Centralized

A
  • Network access auth is done using a single centralized authorization unit.
  • Maintains a single database for authorizing all the network resources or applications.
  • Easy and inexpensive authorization approach.
42
Q

Types of authorization systems: Decentralized

A
  • Each network resource maintains its authorization unit and performs authorization locally.
  • It maintains its own database for authorization.
43
Q

Types of Authorization systems: Implicit

A
  • Users can access the requested resource on behalf of others.
  • The access request goes through a primary resource to access the requested resource.
44
Q

Types of Authorization: Explicit

A
  • Unlike implicit authorization, explicit authorization requires separate authorization for each requested resource.
  • It explicitly maintains authorization for each requested object.
45
Q

Accounting:

A
  • Is a method of keeping track of user actions on the network.
  • Keeps track of Who, when, and how.
46
Q

2 types of encryption:

A
  1. symmetric,

2. asymmetric.

47
Q

Symmetric encryption:

A
  • Oldest technique used for encrypting digital data.
  • Is called a symmetric encryption since a single key is used for encrypting and decrypting the data.
  • Is used to encrypt large amounts of data.
48
Q

Asymmetric Encryption:

A

-Uses two separate keys.

–Public key: used for encrypting messages.

–Private key: decrypting messages.

-Also called public key encryption, is used to encrypt small amounts of data.

49
Q

Hashing:

A

Form of cryptography that transforms the info into a fixed-length value or a key that represents the original info.

50
Q

Hashing ensures the security of information by:

A

-checking the integrity of the info on both the sender and receiver sides.

Checking the integrity of info:

  • Sender of message creates a hash code of it and sends the message to the receiver along with its hash code.
  • The receiver again creates a hash code for the same message at the receiver side and compares both the hash codes. If both hash codes match, the message has not been tampered with.
51
Q

Digital signature:

A
  • Uses the asymmetric key algorithm to provide data integrity.
  • A digital signature is created using the hash code of the message, the private key of the sender, and the signature function.
  • It is then verified using the hash code of the message, the public key of send, and the verification function.
52
Q

10 Digital Signature Attributes:

A
  • Serial number: Unique certificate identity
  • Subject: represents owner of the certificate
  • Signature algorithm: states the name of the algorithm.
  • Key-usage: specifies the purpose of the public key.
  • Public-Key: used for encrypting a message or verifying the signature of the owner.
  • Issuer: provides the identity of the intermediary who issued the cert.
  • Valid From: denotes the date from which the cert is valid.
  • Valid to: denotes the date till which the cert is valid.
  • Thumbprint algorithm: specifies the hashing algorithm used.
  • Thumbprint: specifies the hash value for the certificate.
53
Q

PKI:

A

Public Key Infrastructure

54
Q

PKI is a set of:

A

hardware, software, people, policies and procedures required for creating, managing, distributing, using, storing, and revoking digital certs.

55
Q

Components of PKI:

A
  • A certificate authority (CA) that issues and verifies digital certs.
  • A registration authority (RA) that acts as the verifier for the CA.
  • A cert management system for generating, distributing, storage, and verification of certificates.
56
Q

DES:

A

Data Encryption Standard

is: symmetric encryption

57
Q

AAA:

A

authentication, authorization, and accounting