access control Flashcards
____ are data, applications, systems, networks, and physical space are classified as what?
objects
_____ are the users, applications, or processes that need access to objects.
subjects
what are the AAA’s of access control
authentication
authorization
auditing
______ access control stops unwanted or unauthorized activity
preventative
_____ access control searches for details about the attack or the attacker
detective
______ access control implements short-term repairs to restore basic functionality following an attack
corrective
______ access control discourages continued or escalating of attack during an attack
deterrent
_____ access control restores the system to normal operations after the attack and short-term stabilization period
recovery
alternatives to primary access control is called
compensative
______ controls are policies that describe accepted practices.
administrative
_____ controls are computer mechanisms that restrict access.
technical
an arrangement made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group
Federated identity management (FIM)
this access control model is centralized and uses clearance and classification labels
bell la-padula and
biba
_____ is a non discretionary
access control model based on controlled intermediary access application that prevent direct access to the back-end database
clark-wilson
____ states that a system should never reside in a non-secure state
state machine
this access control model, addresses commercial integrity, fair competition, and the avoidance of conflict of interest
brewer and nash
this access control model is mathematical and used for predicting and testing security systems
take-grant
_____ models are academic and mathematical models developed for the analysis of security that present guidelines for the implementation of system security
access control
this bell lapudula’s principle imposes a no read up rule
simple security property
this bell lapudula’s principle imposes a no write down rule.
star property
this bell lapudula’s principle imposes a no write up or read down rule
strong star property
the ______ and ____ uses the MAC model
bell lapadula and
biba
this biba principle imposes a no write up rule to avoid corrupting data at higher levels.
star integrity axiom
this biba principle imposes a no read down rule to avoid obtaining corrupted data from lower levels
simple integrity axiom