Access Control Flashcards
Access Control Lists (ACLs)
Provide an easy method for specifying which users, or subjects, are allowed to access which object (ie. files).
Application- Based IDS (AIDS)
Analyze what’s going on in an application using the application’s transition log files.
Compartmentalized information
This is information that requires a special authorization beyond the normal classification system.
Compensating controls
These controls reinforce or replace normal controls that are unavailable for any reason.
Corrective Controls
These controls remedy the circumstances that enables the unwanted activity, and/or return conditions to where they were prior to the unwanted activity.
Crossover Error Rate (CER)
As the sensitivity of the biometric system is adjusted, FAR & FRR values change inversely.
Detective controls
These controls identify, log, and alert management to unwanted actions or events, as or after they occur.
Deterrent controls
These controls prescribe some sort of punishment, ranging from embarrassment to job termination or jail time for noncompliance. Their intent is to dissuade people from performing unwanted acts.
Directive controls
Those controls dictated by organizational and legal authorities.
Discretionary Access Control (DAC)
A means of restricting access to objects based on the identity of subjects and/or groups to which they belong.
False Rejection Rate (FRR), Type I Error
Authentication fails when it should not. This happens when an authorized person is denied access.
False Acceptance Rate (FAR), Type II Error
Authentication is successful when it should not be. This happens when an unauthorized person is granted access. This may happen because the biometric system cannot distinguish between the biometric signatures of different people. This is the far more serious of the two error conditions.
Host-Based IDS (HIDS)
Analyze information from a single computer and consequently offer greater precision and reliability and can show the results of an attack.
Intrusion Detection Systems (IDS)
Real-time monitoring of events as they happen in a computer system or network, using audit trail records and network traffic and analyzing events to detect potential intrusion attempts.
Intrusion Prevention Systems (IPS)
Any hardware or software mechanism that has the ability to detect and stop attacks.