3 Access Control Flashcards

1
Q

Physical Access Control
Goals (3)

A

1 limit access to facilities
2 authenticate employees seeking access
3 tracking visitors and contractors who access the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CPTED =

A

Crime Prevention Through Environmental Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CPTED Goals (3)

A

1 Natural Surveillance (good visibility)
2 Natural Access Control (gates - funnel)
3 Natural Territory Reinforcement (obvious that an area is closed - signs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two-Person Integrity

A

requires that 2 people must be present to enter a secure area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two-Person Control

A

requires concurrence from 2 people to carry out an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Segregation of Duties

A
  • requires that a single person can’t perform two separate actions, which when combined, might pose a business risk (edit payroll data AND issue checks)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Logical access control =

A

Account and Privilege Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Managing the account lifecycle (5 stages)

A

1 Provisioning new user
2 assigning roles/permissions
3 modifying roles/permissions (for job changes)
4 reviewing access
5 de-provisioning (removing the access) of terminated users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Account Monitoring -things to implement/watch out for (3)

A

1 Inaccurate Permissions
2 User Account Audit
3 Unauthorized use of permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Policy Violations red flags (5)

A

1 impossible travel time logins (home and Eastern Europe)
2 logins from unusual network locations (HR on guest network)
3 unusual time-of-day logins
4 deviations from normal behavior
5 deviations in volume of data transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Geofencing

A
  • alerts when a device leaves defined boundaries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 main benefits of Least Privilege

A

1 minimizes the potential damage from an insider attack
2 limits the ability of an external attacker to quickly gain privileged access when compromising an employee’s account (unless its a system administrator account)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access Control Systems/approaches (3)

A

1 Mandatory Access Control (MAC)
2 Discretionary Access Control (DAC)
3 Role-based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC =

A
  • OS makes decisions by comparing user labels with resource labels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DAC =

A
  • file owners have the discretion to configure user permissions as they see fit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3 Role-based Access Control (RBAC)

A
  • administrators create job-based roles and assign permissions to those roles
17
Q
A