access control Flashcards

1
Q

access control

A

a collection of mechanisms that work together to create security architecture to protect the assets of an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

security policy

A

states who is allowed to do what

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are some examples of objects

A

file
directory
data
service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

authorisation

A

checks whether a request for an object can be granted
the act of setting the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

reference monitor

A

the guard enforcing the policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

access control list

A

attached to each object in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

accountability

A

a security goal that allows actions of an entity to be tracked back to that entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are some benefits of accountability

A

can investigate parties involved in a breach
can check whether an organisation is following regulations
allows for deterrence, fault isolation, intrusion detection and prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

physical access control

A

using locks security guards badges etc to control people/vehicles entering a protected area via authentication and authorisation
prevents gaining physical access into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

information/asset owner

A

responsible for who uses the system and how to recover it in a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

logical access control

A

prevents logical (usually remote) access via the validation of a users identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

confidentiality in CIA

A

protect data and personal privacy from leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

integrity in CIA

A

ensure accuracy completeness consistency and validity of the organisations or a persons data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

availability in CIA

A

data should be available when requested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

in which four ways can we allocate privileges

A

mandatory access control
discretionary access control
the least privilege
role based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

mandatory access control

A

the security policy is centrally controlled by a policy/security administrator therefore the rules are set by the system and enforced for all users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is access based on in mandatory access control

A

subjects objects and labels

18
Q

subjects in mandatory access control

A

people or other systems that are granted clearance

19
Q

objects in mandatory access control

A

assets being protected

20
Q

labels in mandatory access control

A

binds the object to the subject
defines whether a subject can access an object based on the labels classification

21
Q

discretionary access control

A

decentralised
allows the object owner to grant permissions to other users

22
Q

what does the access control list contain in discretionary access control

A

user id file names and permissions

23
Q

what are some examples of permissions

A

read
write
update
delete
rename
execute

24
Q

the least privilege

A

giving people the least amount of access required to do their job

25
Q

what is the benefit of using the least privilege

A

lesser risk of leaking data and compromising the integrity

26
Q

role based access control

A

each user is assigned to a group then assigning access control rights to each group

27
Q

benefits of role based access control

A

good for high number of employees and frequently changing roles
stops a single user from becoming too powerful

28
Q

what must we do before handing over privileges

A

check identity and the handover phase must be secure

29
Q

how do we record privileges

A

using logs

30
Q

why do we monitor access

A

helps notice abnormal behaviour
users may become malicious via malware on their device
collect data for security incidents
identification and authentication mechanisms may be vulnerable
users may want to extend privileges illegally

31
Q

why do we monitor password systems

A

evidence of password experimentation (forgetting it)
evidence of logins when the user is absent

32
Q

audit policies

A

define which events will be logged

33
Q

event logs

A

used by accountability
attackers may hide their traces by deleting relevant logs but they shouldnt be able to tamper with the evidence already logged

34
Q

hashing

A

using a hash function to encrypt plaintext

35
Q

what are the 2 things that hashing must do

A

be one way; it can only be solved via brute force
be collision resistant; cybertext shouldnt have duplicates

36
Q

salting

A

adding random data to the pw before hashing
the salt is stored with the encrypted data

37
Q

what are benefits of salting

A

prevents cracking methods
the same string will hash into different values at different times
users with the same password will have different encrypted passwords stored

38
Q

brute force attacks

A

guaranteed to work eventually
must determine the alphabet used as some special characters are excluded from passwords

39
Q

rainbow table attacks

A

predocumented lookup table for storing hashes

40
Q

dictionary attacks

A

only work if the pw is already in the dictionary