Access Control Flashcards

1
Q

Implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Verification that the credentials of a user or other system entity are valid.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The granting of a right or permission to a system entity to access a system resource.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures.

A

Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the access control policies?

A

Discretionary access control (DAC)
Mandatory access control (MAC)
Role-based access control (RBAC)
Attribute-based access control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Controls access based on the identity of the requestor and on access rules stating what requestors are allowed to do.

A

Discretionary access control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Controls access based on comparing security labels with security clearances.

A

Mandatory access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.

A

Role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Controls access based on attributes of the user, the resource to be accessed, and current environmental conditions.

A

Attribute-based access control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the basic elements of access control?

A

Subject
Object
Access right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _____ is an entity capable of accessing objects.

A

subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access control systems typically define three classes of subject, with different access rights for each class. What are they?

A

Owner - created the file
Group - given access rights as a owner
World - least amount of access granted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An _____ is a resource to which access is controlled.

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An ____ _____ describes the way in which a subject may access an object.

A

access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access rights have multiple privileges, such as:

A

Read, write, execute, delete, create, search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List users and their permitted access rights.

A

Access control lists

17
Q

A ____ _____ specifies authorized objects and operations for a particular user.

A

capability ticket

18
Q

Certain areas of memory are protected from the users’s use and in which certain instructions may not be executed.

A

user mode

19
Q

Privileged instructions may be executed and in which protected areas of memory may be accessed.

A

kernel mode

20
Q

What are the entities in an RBAC system.

A

User
Role
Permission
Session

21
Q

A ______ is a defined relationship among roles or a condition related to roles.

A

constraint

22
Q

What are the types of constraints?

A

Mutually exclusive roles
Cardinality
Prerequisite roles

23
Q

______ ____ ____ are roles such that a user can be assigned to only one role in the set.

A

Mutually exclusive roles

24
Q

What are the properties of mutually exclusive role?

A
  1. A user can only be assigned to one role in the set

2. Any permission can be granted to only one role in the set.

25
Q

_____ refers to setting a maximum number with respect to roles.

A

Cardinality

26
Q

Dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role.

A

Prerequisite role

27
Q

What are the three elements to an ABAC model?

A

Attributes - which are defined for entities in a configuration
Policy model - which defines the ABAC policies
Architecture model - which applies to polices that enforce access control

28
Q

A _______ is a set of rules and relationships that govern allowable behavior within an organization, based on the privileges of subjects and how resources or objects are to be protected under which environment conditions.

A

policy

29
Q

_______ represent the authorized behavior of a subject

A

privileges

30
Q

What does ICAM stand for?

A

Identity, credential access management

31
Q

What is ICAM designed for?

A
  1. Create trusted digital identity representations of individuals and what the ICAM documents refer to as nonperson entities.
  2. Bind those identities to credentials that may serve as a proxy for the individual or NPE in access transactions.
  3. Use the credentials to provide authorized access to an agency resources.
32
Q

What are the three support elements needed in enterprise-wide access control?

A

Resource management
Privilege management
Policy management