5. Logical and Physical Access Control Flashcards
Logical access control: what is often used to manage?
Logical access control software: by function or application, who can read, copy, write, create update, delete, execute.
Logical access control: what kind of proof is used for user authentication?
- Proof by knowledge: passwords
- Proof by knowledge and possession: security tokens/credit cards
- Proof by physical identifier: biometric controls (thumbprint, retina patterns, voice-print, face)
- Proof by mannerism/context: touch on the keyboard, time of system use
- Multi-factor authentication: multiple authentication procedures - highly secure
Logical access control: Password (knowledge): how good are they? How are they need to be?
- Not so good authentication system.
- Need to be strong (i.e. impossible to remember - use password manager?): eight or longer characters, include upper/lower case letters, one numeral and one special character, change periodically (every 3 months?)
Logical access control: Password: what is an effective control?
Standard: lockout after 3 failed attempts with reset.
Logical access control: what is security token?
One-time password (device displays; user inputs device password, user ID and account password) - e.g. new password: generate every 30-60 seconds
Logical access control: what are smart cards and identification badges?
Embedded identification information read by card reader
e.g. credit card chip
Logical (electronic) access control: what does user authorization matrix do?
Define user’s access rights based on role.
Logical access control: what makes security (challenge) questions good?
Safe, memorable, stable, definitive.
Should not use something people could easily search for.
Logical access control: what are 3 kinds of firewall?
NAP: Network, Application, Personal
Logical access control: what is and does firewall do?
Prevent and detect unauthorized access.
Hardware and/or software to review and filter network traffic.
e.g. block noncompliant data packets based on set parameters.
Logical access control: what is and does network firewall do?
On a network (e.g. server).
- Filters data packets based on header info (source and destination IP address and communication port)
- Blocks noncompliant transmission based on rules in access control list
- Very fast (examine headers only)
- Forward approved packets to application firewall
Logical access control: what is application firewall?
- Inspect data packet contents
* Can perform deep packet inspection (detailed packet examination)
Logical access control: what is personal firewall?
Software enabling end-users to block unwanted network traffic.
Usually on a home network or computer.
Logical access control: what is IDS? What does it do?
Intrusion Detection Systems.
*Monitors network for anomalies
Logical access control: IDS: what are 3 identification methods?
- Signature-based: stored patterns/sources
- Statistical-based: unusual activity - modeling
- Neural networks: learns from created database
Logical access control: what is IPS? Example?
Intrusion Prevention Systems - allows identification and blocking from live systems
E.g. honeypot/honeynet: allow hackers access to a decoy system