5.3 : Logical Access (Doshi) Flashcards
Logical access controls in information technology is used for the following (4):
(1) identification
(2) authentication
(3) authorization, and
(4) accountability in computer information systems
The two main types of access controls:
(1) physical and
(2) logical
Physical access control
Limits access to campuses, buildings, facilities, and physical IT assets
Logical access control
Limits connections to computer networks, system files and data.
Four main categories of access controls are:
(1) Mandatory Access Control (MAC)
(2) Discretionary access control (DAC)
(3) Role-based access control
(4) Rule-based access control
Mandatory Access Control (MAC)
is logical access control that cannot be controlled or modified by normal users or data owners.
Discretionary Access Control (DAC)
(DACs) are logical access control that may be activated or modified by the data owners at their discretion.
MAC compared to DAC ; in terms of data security, which is the best choice
MACs are better choice
Steps to follow when implementing logical access control:
(1) Inventory of IS resources
(2) Classification of IS resources
(3) Grouping/labeling of IS resources
(4) Creation of an access control list
What is the first step on data classification?
Identify the owner of the data/application
Automated password management tool vs Manual password management tool
In any given scenario, an automated password management tool works as best preventive control and ensures compliance with password management policy
Preventive controls as compared to detective and deterrent controls
In any given scenario, PREFERENCE to be given to PREVENTATIVE controls as compared to detective or deterrent controls.
Automated controls as compared to manual controls
In any given scenario, preference to be given to automated controls as compared to manual controls
What is the prime objective of review of logical access control?
to ensure access have been assigned as per organization’s authorization
In any given scenario, data owner/system owner is ultimately responsible
for defining the access rules.