Access Control Flashcards

1
Q

What is * (star) integrity?

A

Biba model, which prohibits “write up” from a lower to a higher security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is * (star) security?

A

Bell-LaPadula model, which prohibits writing down to a process at a lower security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is access control based on job functions or duties?

A

Role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is centralized control?

A

All identity management and access control decisions for an organization are handled by one server system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is decentralized access control?

A

An organization’s total access control needs is partitioned, with each partition having its own access control servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between decentralized and centralized access control?

A
  • Centralized: harder to set up but easier to make global changes and updates
  • Decentralized: easier to set up but harder to maintain or make global changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is discretionary access control?

A

Allows subjects to modify access control system constraints, rules, or policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is identity proofing?

A

Establishes the truthfulness of documents or other information that attest to a person’s claim to be that person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Institute of Electrical and Electronics Engineers (IEEE) 802.1X?

A

Access control standard that defines the Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is mandatory access control address whitelisting?

A

Access control restricted to device matching MAC addresses; done by router or firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is privilege creep?

A

Continued accumulation of privileges despite changes in job, role, functions, or conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a reference monitor?

A

the functionality that checks every access attempt to see if it should be authorized or denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is separation of duties?

A

Policies that allocate parts of sensitive or critical job functions to different people so that no one single person performs all tasks and can see or modify data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the steps in identity management?

A

Provisioning, review, revocation, deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the subjects and objects?

A

Subjects are people, processes, tasks, or devices that are trying to do things to objects, such as read, copy, modify, and run them;

Objects can be people, devices, files, or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the AAA of access control?

A
  • Authentication
  • Authorization
  • Accounting
17
Q

What is transitive trust?

A

If node A trust B, and B trust C, then node A trusts C. This is how chains of trust form

18
Q

What is a Type 1 access control error?

A

False positive, allowing an unauthorized subject or user to gain access

19
Q

What is a Type 2 access control error?

A

False negative, prohibiting an authorized user from gaining access

20
Q

What kind of subjects should be authenticated before being granted access?

A

All types (devices, people, software processes)

21
Q

How do intranet, extranet, and wide area networks differ?

A
  1. Intranet is an internet segment under local administration and control of an end user organization
  2. Extranet is an internet segment that join multiple intranets together
  3. WANs connect many LANs, WANs, or other networks usually across a large geographic area such as a city
22
Q

How do identity assurance levels (IALs) relate to just in time identity?

A

Enables to use just in time or self provisioning identity and account creation to meet their overall security needs.

  • IAL1 does nothing
  • IAL2 requires validation by means of another online identity provider
  • IAL3 requires physical verification of the authenticity and correctness of documents that attest to the identity being claimed
23
Q

What steps are generally part of credential management?

A

Sponsorship, enrollment, production, issuance, suspension, expiration, or other actions required

24
Q

What are the 3 main inputs to a user and entity behavioral modeling and analytics (UEBA) access control system?

A

Threat typologies, allowed behavior typologies, and user or entity session histories