ch 12 Flashcards
Granting or denying approval to use specific resources
• Access Control
Consists of fencing, hardware door locks, and mantraps to limit contact with devices
Physical access control
Consists of technology restrictions that limit users on computers from accessing data
Technical access control
what is it called when Presenting credentials
Identification
what is it called when Checking the credentials
Authentication
what is it called when Granting permission to take action
Authorization
A record that is preserved of who accessed the network, what resources they accessed, and when they disconnected
Accounting
A specific resource
Object
A user or process functioning on behalf of a user
Example: computer user
Subject
The action taken by the subject over an object
Example: deleting a file
Operation
Standards that provide a predefined framework for hardware or software developers
Use the appropriate model to configure the necessary level of control
Access control model
(D A C)
• Discretionary Access Control
Least restrictive model
Every object has an owner
Owners have total control over their objects
Owners can give permissions to other subjects over their objects
• Discretionary Access Control (D A C)
• (M A C)
Mandatory Access Control
Most restrictive access control model User has no freedom to set any controls or distribute access to other subjects
Typically found in military settings
• (M A C) Mandatory Access Control
Every entity is an object and is assigned a classification label that represents the relative importance of the object
Labels
a hierarchy based on the labels is used
Levels
grants permissions by matching object labels with subject labels
M A C
(B L P)
Bell-LaPadula
(M I C)
Mandatory Integrity Control
(U A C)
User Access Control
- a Windows feature that controls user access to resources
User Access Control (U A C)
(RBAC)
Role Based Access Control
Also called Non-Discretionary Access Control
Access permissions are based on user’s job function
(RBAC) Role Based Access Control
(RBAC)
Rule-Based Access Control
Dynamically assigns roles to subjects based on a set of rules defined by a custodian
Each resource object contains access properties based on the rules
(RBAC) Rule-Based Access Control
When initially setting up an account, take these into consideration:
Employee accounts Creating location-based policies Establishing standard naming conventions Creating time-of-day restrictions Enforcing least privilege
Employee On-boarding steps:
Scheduling Job duties Socializing Work space Training