Authentication Flashcards

1
Q

What is Access Control?

A

Access Control is the set of technical controls that governs how subjects (users) may interact with objects (network resources).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Access Control List (ACL)?

A

An ACL is a list of subjects and the rights or permissions they have been granted on an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four main processes in an Access Control system?

A
  1. Identification, 2. Authentication, 3. Authorization, 4. Accounting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Identification in Access Control?

A

Identification is creating an account or ID that identifies the user or process on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authentication in Access Control?

A

Authentication is proving that a subject is who or what it claims to be when it attempts to access a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the five authentication mechanisms?

A
  1. Something you know, 2. Something you have, 3. Something you are, 4. Something you do, 5. Somewhere you are.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Physical Access Controls?

A

Physical Access Controls govern the movement of people within an organization’s facilities, using methods such as walls, fencing, guards, and ID cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Logical Access Controls?

A

Logical Access Controls govern access to specific system resources, controlling who or what can access them and the type of access permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Mandatory Access Control (MAC)?

A

MAC is a model where access is granted based on data confidentiality and user clearance levels, typically used in government and military environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Discretionary Access Control (DAC)?

A

DAC is an identity-based model that allows data owners to define access permissions for specific users or groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Role-Based Access Control (RBAC)?

A

RBAC assigns access rights based on the role an individual has within an organization, rather than to individuals directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Rule-Based Access Control?

A

Rule-Based Access Control allows or denies access based on a set of predefined rules, such as IP address restrictions or time-based access permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Bell-LaPadula model?

A

The Bell-LaPadula model enforces confidentiality with the rules: “No read up, no write down.” It is focused on preventing information leaks in secure systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Biba model?

A

The Biba model focuses on data integrity with the rules: “No read down, no write up.” It is designed to prevent unauthorized changes to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Clarke-Wilson Security Model?

A

The Clarke-Wilson model focuses on maintaining data integrity by preventing unauthorized modifications and ensuring internal consistency of data through well-formed transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a “Chinese Wall”?

A

A Chinese Wall is an internal security measure designed to prevent information from leaking between different clients within a firm by restricting access and ensuring confidentiality.

17
Q

What is Biometric Authentication?

A

Biometric Authentication uses measurable physical characteristics like fingerprints, palm prints, and facial recognition to authenticate users.