access control Flashcards

1
Q

____ are data, applications, systems, networks, and physical space are classified as what?

A

objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ are the users, applications, or processes that need access to objects.

A

subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the AAA’s of access control

A

authentication
authorization
auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ access control stops unwanted or unauthorized activity

A

preventative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ access control searches for details about the attack or the attacker

A

detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ access control implements short-term repairs to restore basic functionality following an attack

A

corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

______ access control discourages continued or escalating of attack during an attack

A

deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ access control restores the system to normal operations after the attack and short-term stabilization period

A

recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

alternatives to primary access control is called

A

compensative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

______ controls are policies that describe accepted practices.

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ controls are computer mechanisms that restrict access.

A

technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

an arrangement made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group

A

Federated identity management (FIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this access control model is centralized and uses clearance and classification labels

A

bell la-padula and

biba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a non discretionary
access control model based on controlled intermediary access application that prevent direct access to the back-end database

A

clark-wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ states that a system should never reside in a non-secure state

A

state machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

this access control model, addresses commercial integrity, fair competition, and the avoidance of conflict of interest

A

brewer and nash

17
Q

this access control model is mathematical and used for predicting and testing security systems

A

take-grant

18
Q

_____ models are academic and mathematical models developed for the analysis of security that present guidelines for the implementation of system security

A

access control

19
Q

this bell lapudula’s principle imposes a no read up rule

A

simple security property

20
Q

this bell lapudula’s principle imposes a no write down rule.

A

star property

21
Q

this bell lapudula’s principle imposes a no write up or read down rule

A

strong star property

22
Q

the ______ and ____ uses the MAC model

A

bell lapadula and

biba

23
Q

this biba principle imposes a no write up rule to avoid corrupting data at higher levels.

A

star integrity axiom

24
Q

this biba principle imposes a no read down rule to avoid obtaining corrupted data from lower levels

A

simple integrity axiom