2- Logical Access Control Flashcards

1
Q

Logical access controls

A

Logical access controls are used to control whether and how subjects (usually persons) are able to access objects (usually data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ways that logical access controls work

A

• Subject access - Determine the identity of the subject that is requesting access and validate or reject that request.

• Service access - Used to control the types of messages that are allowed to pass through a control point. Can permit or denied message type.
Ex : Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control concepts

A
  • Subject: someone or something that needs access
  • Object: The things that the subject wants to access
  • Fail closed: Means that all accesses will be denied if the access control fails.
  • Fail open: Means that all accesses will be permitted upon failure.
  • Least privilege: - concept that an individual user should have the lowest privilege possible that will enable them to perform their task
  • Segregation of duties - One person should not have all privileges
  • Split Custody - Concept of splitting knowledge of a specific object or task between two persons.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access control methods

A
  • Mandatory Access Control (MAC) - Used to control access to object by subjects. User cannot ride this type of access.
  • Discretionary Access Control (DAC) - Owner of an object is able to determine how and by who the object may be accessed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access control treats.

A
  • Malware: A malicious code used to perform unauthorized actions on target systems.
  • Eavesdropping: network or sniffing tools to listen to network communication
  • Logical bombs: A set of instructions that is designed to perform some damaging action when a specific event occurs.
  • Back door: A section of code that permits someone to bypass access control and data or function.
  • Scanning attacks: Attacked performs an active or passive scanning in an attempt to discover weak access controls. Exp: port scanning; war dialing ( search for unprotected moderms); War driving (look for vulnerable Wireless access poin)
  • Race conditions : Known as time-of-check/time-of-use attack ; the attacker is attempting to exploit the small window of time that sometimes exists between the time that a resource is requested and when the resource is available for use.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access control vulnerabilities

A
  • Unpatched systems: Security patches are designed to remove specific vulnerabilities.
  • Default system setting - often include unnecessary services that increase the chances that an attacker can find a way to break into a system
  • Default password
  • Incorrect permission settings
  • Vulnerabilities in utilities and applications
  • Application logic : software applications that are aceesible via internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are of information-based resources accessed

A

The majority of information-based resources are accessed via TCP/IP networks;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main points of entry in information system

A

The internal corporate LAN. A user who can connect to the corporate LAN is able to logically reach computing resources in the organization—subject to the access controls associated with each resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What an organization could do to protect corporate access (network)

A

By controlling access to LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the biggest issue when controlling access to LAN

A

The ability for nonorganization-owned computers to connect to the network and access network-based resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risks that created when computers are connected to the organization’s network.

A
  • Exposure to malware
  • Eavesdropping - Non-organization computers can be loaded with sniffers
  • Open Access via WI-FI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Access control (NAC)

A

Network protocols used to control access to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NAC and protocol 802.1X

A

Network access protocol used to control whether a system is permitted to connect to corporate network resources.

They use an authentication mechanism to determine if each new device is permitted to connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly