Access Control Flashcards
Access Control Systems include
File Permissions, Program Permissions and Data Rights
File Permissions allows
Create, Read, Edit or Delete on a File Server
Program Permissions allows
execution of a program on a server.
Data Rights allows
right to retrieve or update information in a database.
A “SUBJECT” is
an ACTIVE entity i.e., an individual or process that accesses an OBJECT.
An “OBJECT” is
a PASSIVE entity i.e., system or process that a SUBJECT ACTS UPON or accesses.
PREVENTIVE controls are for
reducing risk.
DETECTIVE controls are for
identifying violations and incidents.
CORRECTIVE controls are for
remedying violations and incidents and improving existing preventive and detective controls.
DETERRENT controls are for
discouraging violations and dissuading malicious activity.
RECOVERY controls are for
restoring systems and information.
COMPENSATING controls are for
providing alternative ways of achieving a task.
Preventive controls together with and overall security program are compensated by
DETECTIVE, CORRECTIVE, DETERRENT, RECOVERY and COMPENSATING controls.
ACCESS controls can be
Administrative, Technical, and Physical
ADMINISTRATIVE controls include
policies and procedures that are implemented as part of an overall information security strategy
Types of ADMINISTRATIVE controls may include
policies, standards, guidelines and procedures. Security awareness training. Asset clarification and control. Employment policies. Account administration. Account, log and journal monitoring. Review of audit trails.
TECHNICAL controls are
technical ( or logical ) controls that leverage HW or SW to implement access control.
PREVENTIVE TECHNICAL controls include
encryption, access control mechanisms, access control lists ( ACLs), Remote Access authentication protocols.
Common technical ENCRYPTION controls are
DES ( Data Encryption Standard ) AES ( Advanced Encryption Standard ) and Merkle-Hellman Knapsack.
Access Control Mechanisms are
Biometrics, Smart Cards, and Tokens.
Access Control Lists ( ACLs ) are
permission defining what a SUBECT can or cannot do to an object.
Remote Access Authentication Protocols are
PAP ( Password Authentication Protocol ) CHAP ( Challenge HandShake Authentication Protocol ) RADIUS ( Remote Authentication Dial In User Service ) and LDAP ( Lightweight Directory Access Protocol )
DETECTIVE TECHNICAL controls include
Violation reports, Audit Trails, Network Monitoring and Intrusion Detection.
PHYSICAL controls ensure
safety and security of the physical environment they are primarily PREVENTIVE AND DETECTIVE.
PHYSICAL PREVENTIVE controls include
perimeter protections like; fences, locked entry, restricted area and guards / dogs.
PHYSICAL DETECTIVE controls include
Motion detection and video cameras
ACCESS CONTOL SYSTEMS provide what three essential services?
Authentication, Authorization, and Accountability.
AUTHENTICATION is
( who can log in ) a two step process of Identification and Authentication or ( I&A).
IDENTIFICATION is the means by which
a user ( SUBJECT ) presents a specific ID ( like a USERNAME ) to a system ( OBJECT )
AUTHENTICATION is the process of verifying
an identity… IDENTIFICATION ( I of I&A) . A USERNAME ( identity) is verified with a PASSWORD ( authentication ).
What determines a SUBECT can LOG in
AUTHENTICATION
AUTHORIZATION or “establishment” defines
rights and permissions granted to a user account or process. ( what can be done with a system or resource )
What determines a what a SUBECT can do with assigned rights and permissions.
AUTHORIZATION
ACCOUNTABILITY is the capability to associate users and processes with
ACTIONS ( what they did ) AUDIT TRAILS AND SYSTEM LOGS.
“This” determines what a SUBJECT did
ACCOUNTABLITY
The ability to irrefutably associate a user with an action that can’t be denied is
NON-REPUDATION
What are the two categories of ACCESS CONTROL
SYSTEM ACCESS / DATA ACCESS controls