Access Control Flashcards

1
Q

Access Control Lists (ACLs)

A

Provide an easy method for specifying which users, or subjects, are allowed to access which object (ie. files).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application- Based IDS (AIDS)

A

Analyze what’s going on in an application using the application’s transition log files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compartmentalized information

A

This is information that requires a special authorization beyond the normal classification system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compensating controls

A

These controls reinforce or replace normal controls that are unavailable for any reason.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Corrective Controls

A

These controls remedy the circumstances that enables the unwanted activity, and/or return conditions to where they were prior to the unwanted activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crossover Error Rate (CER)

A

As the sensitivity of the biometric system is adjusted, FAR & FRR values change inversely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detective controls

A

These controls identify, log, and alert management to unwanted actions or events, as or after they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deterrent controls

A

These controls prescribe some sort of punishment, ranging from embarrassment to job termination or jail time for noncompliance. Their intent is to dissuade people from performing unwanted acts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Directive controls

A

Those controls dictated by organizational and legal authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Discretionary Access Control (DAC)

A

A means of restricting access to objects based on the identity of subjects and/or groups to which they belong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

False Rejection Rate (FRR), Type I Error

A

Authentication fails when it should not. This happens when an authorized person is denied access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

False Acceptance Rate (FAR), Type II Error

A

Authentication is successful when it should not be. This happens when an unauthorized person is granted access. This may happen because the biometric system cannot distinguish between the biometric signatures of different people. This is the far more serious of the two error conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Host-Based IDS (HIDS)

A

Analyze information from a single computer and consequently offer greater precision and reliability and can show the results of an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intrusion Detection Systems (IDS)

A

Real-time monitoring of events as they happen in a computer system or network, using audit trail records and network traffic and analyzing events to detect potential intrusion attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intrusion Prevention Systems (IPS)

A

Any hardware or software mechanism that has the ability to detect and stop attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Kerberos Process

A

An SSO open-standards protocol for authentication in a single security domain.

17
Q

Key Distribution Center (KDC)

A

Works as both an Authentication Server (AS) and a Ticket Granting Server (TGS).

18
Q

Least priviledge

A

The principle that people or processes should only be allowed access to the resources they absolutly need to accomplish their assigned work, and only for as long as necessary to complete that work.

19
Q

Mandatory Access Control (MAC)

A

Means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (ie. clearance) of subjects to access information of such sensitivity.

20
Q

Need-to-know

A

This principle restricts users from accessing information or systems not required to perform their jobs.

21
Q

Network-Based IDS (NIDS)

A

Can detect potential attacks by analyzing captured network packets.

22
Q

Preventive controls

A

These controls block unwanted actions.

23
Q

Recovery controls

A

These controls restore lost computing resources or capabilities and help the organization to return to normal operations and recover monetary losses caused by a security violation or incident.

24
Q

Rule-Based Access Control

A

Access is based on a list of rules created or authorized by system owners that specify the priviledges granted to users.

25
Q

Security Domains

A

The set of objects that a subject in an information system is allowed to access.

26
Q

Seperation of duties

A

No one person should have control over the complete processing of a transaction or series of transactions where that control would allow the person to manipulate the transaction(s) for personal gain or make an avoidable mistake.

27
Q

Single Sign-On (SSO) Process

A

A centralized authentication database that administers access to multiple resources.

28
Q

Social engineering

A

Gaining critical or sensitive information through social interaction, typically with the organization’s employees, suppliers, and contractors.

29
Q

War dialing

A

The technique of sequentially calling a range of telephone numbers in an attempt to identify modems, remote access devices, and maintenance connections of computers on a network.

30
Q

Wireless penetration

A

The introduction of wireless networks and other wireless devices such as keyboards, mice, and VGA projectors, whether through formal approved network configuration management or the inadvertent actions of well-meaning users, have introduced additional security exposures.