2. Access Controls Flashcards
Access control systems use what 2 items:
identification and authentication.
Identification occurs…
when a subject professes an identity
authentication occurs…
when the user proves the identity
What are the three factors of authentication?
The three factors of authentication are something you know (such as passwords), something you have (such as proximity cards), and something you are (using biometrics).
What are examples of something you have?
Proximity cards, smart cards, and hardware tokens
Gibson, Darril (2011-11-17). SSCP Systems Security Certified Practitioner All-in-One Exam Guide (Kindle Location 1529). McGraw-Hill Education. Kindle Edition.
When more than one authentication factor is used, it is called…
multifactor authentication.
When evaluating the effectiveness of biometrics, you should consider…
the type 1 and type 2 errors.
What is a Type 1 error?
False Reject Rate (FRR or type 1 error) refers to the percentage of times a system falsely rejects a known user.
What is a Type 2 error?
False Accept Rate (FAR or type 2 error) refers to the percentage of times a biometric system falsely identifies an unknown user as a known user.
What is a CER?
The Crossover Error Rate (CER) indicates the point where the FAR and FRR are equal. Lower CERs indicate a better biometric system.
Lower CERs indicate…
a better biometric system.
Single sign-on (SSO) allows a user to authenticate…
once for a system.
Many SSO systems use…
federated access, providing centralized authentication for different systems.
What are other technologies that use one-time passwords?
OPIE and S/KEY
A security kernel (a central part of an operating system) enforces security for the operating system by doing what?
monitoring subjects and objects.
Examples of subjects are…
users, computers, and applications.
Examples of objects include…
data, hardware, and facilities.
Access controls can be one of two things?
logical (implemented with technology such as a security kernel) or physical (such as locked doors).
Which Access Control Model provides the most granular control?
The DAC model provides the most granular control. Individual users own the objects and can provide permissions to subjects as desired.
DAC is used with file systems such as…
NTFS and NFS.
The RBAC model uses ?. Subjects (such as users) are placed into ?, and permissions to objects are assigned directly to the ?. What single word is missing?
role(s)
The MAC model is an example of a non-DAC model. Does it provide a higher or lower level of security than DAC?
It provides the highest level of security, is used by the military, and uses labels.
What does MAC use to control access?
Labels.
How does MAC security work?
Both subjects and objects are assigned labels and when the labels match, access is granted.
Several architectures are based on the MAC model. What are they?
Bell-LaPadula
Biba
Clark-Wilson
Chinese Wall