Access Control Flashcards
Provide an example of a “Subject” and an example of an “Object”
Subject - Anything operating on something else
Object - The thing being operated on
Definition of Access Control
Any hardware, software, administration, or process that performs the following tasks:
- Identifies users or subjects attempting to access resources
- Determines if access is authorized
- Grants or restricts access
- Monitors and records access activities
Can a subject be an object and then change repeatedly?
True
Explain Users vs Owners
User accesses and object and an owner determines which users can access the object.
There can be only one owner but multiple users
What is the CIA Triad?
C - Confidentiality… Can we keep the wrong people out?
I - Integrity… ensure only authorized changes occur
A - Availability… Is it available when I need it?
What is the difference between rights and permissions?
Interchangeable… but a permission seems to be a lower level authorization and rights tends to be higher level (system wide).
What are privileges?
The combination of rights and permissions (whole assembly).
What are the 7 types of access control?
Preventive - Gates, fences, passwords, biometrics
Detective - log analysis, CCTV (after the fact)
Corrective - Modification after something happened
Deterrent - Policies, signs, etc
Recovery - Repairs/ fixes made to fix
Directive - Signs, manuals, supervisors
Compensation - Compensating
What are Administrative Controls
Policies, procedures, hiring practices, etc
What are logical/ technical controls
Hardware or software controls (usernames, passwords or biometrics)
What are Physical Controls
This that can be physically interacted with (door locks, mantraps, etc)
What is a defense in depth strategy?
The use of multiple layers (typically three)
- Administrative
- Logical/ technical
- Physical
What are the elements of access control?
Authentication - Proof of a claimed identify
Authorization - Subject is granted access to objects on a proven identity
Accountability - Auditing to track subjects use of objects
What are the three types of Authentication?
- Something you know (password)
- Something you have (token) (somewhere too)
- Something you are (finger prints)
Effective accountability relies on which two of the three: Authentication, authorization, identification
Authorization - We just need to know who they are (reliably) and that they got in appropriately. Logging should cover whether or not it was properly authenticated.
Name several “good” authentication techniques
Passwords, god password selection, password aging, password complexity, password history
Name some examples of cognitive passwords
Date of birth, mothers maiden name, first pet
Are cognitive passwords effective?
Not in the age of social engineering