Access Control Schemes Flashcards

1
Q

Identification

A

This is similar to everyone who has their own bank account. The account is identified by the account details on the bank card. Identification in a security environment may involve having a user account, a smart card, or maybe a fingerprint reader - this is unique to that individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

Once the individual inserts their method of identification, they are then authenticated, for example, by inserting a password or a PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

This is the level of access you have to selective data. You are normally a member of certain groups; for example, a sales manager could access data from sales group and then access data from the managers group. You will only be given the minimum amount of access required to perform your job. This is known as least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Privilege Access Management (PAM)

A

This is a solution that helps protect the privilege accounts within a domain, preventing attacks such as pass the hash, pass the ticket, and privilege escalation. It also gives visibility in terms of who is using privilege accounts and what tasks they are being used for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mandatory Access Control (MAC)

A

MAC is based on the classification level of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAC levels

A

Top Secret: Highest level, exceptionally grave damage
Secret: Causes serious damage
Confidential: Causes damage
Restricted: Undesirable effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC Roles

A

Owner: This is the person who writes the data and determines the classification
Steward: The steward is the person who is responsible for labeling the documents
Custodian: The custodian is the person who stores and manages classified data
Security Administrator: The security administrator is the person who gives access to classified data once clearance has been approved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly