Chapter 1 - Access Control Flashcards

1
Q

Access Controls encompass all operational levels of an organization.

A

Facilities; Support Systems; Information Systems; and Personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

C-I-A

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two Philosophies for Access Control

A

Allow by Default and Deny by Default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Defense in Depth Strategy

A

Applying multiple layers of security protection between an information resource and a potential attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three step process for determining access controls

A
  1. Defining Resources 2. Determining Users 3. Specifying the Users use of the resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Consistent Access Control Strategy

A

Simplicity is the key to an effective security system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Separation of Duties

A

Primary Objective is the prevention of fraud and errors. Distributing tasks and associated privileges for a specific process among multiple people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Processes

A

Collection of tasks that must be performed to achieve an objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Applicabililtiy of Separation of Duties

A

Sensitivity of the function under consideration; and the elements within a function are prone to abuse, which are easily segmented, and what skills are available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Least privilege

A

User is given no more access priviliege than necessary to perform a job, task, or function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Need to know

A

Defines the minimum needed to know to perform job function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compartmentalization

A

Seperating groups of people and information such that each group is isolated and information does not flow between groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security domain

A

Area where common process and security control work to separate all entities involved in these processes from other entities or security domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information Classification

A

Objective is to group an organization’s information assets by levels of sensitivity and criticality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information Classification Program

A
  1. Determine objectives 2. Establish organizational support 3. Develop policy and supporting procedures 4. Develop process flows and procedures 5. Develop tools to support 6. Identify process and application owners 7. Identify information owners and delgates 8. Distribute standard templates 9. Classify information and applications 10. Develop auditing procedures 11. Load classification information into a central repository 12. Train users. 13. Periodically review and update information classifications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access Control System Requirements

A

Reliability, Transparency, Scalability, Integrity, Maintainability, Authentication Data Security, and Auditability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Main Categories of Access Control

A
  1. Directive - apply rules 2. Deterrent - discourage violations 3. Preventitive - prevent incident 4. Compensating - mitigate risk 5. Detective - signal warning when breached 6. Corrective - remedy circumstance 7. Recovery - restore conditions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Access Control Types

A
  1. Administrative Controls - define roles, responsibilities, policies, and administrative functions. 2. Logical (Technical) controls - electronic hardware and software solutions implemented to control access to information and information networks. 3. Physical Controls - protect physical environment - locks, gates, guards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Major Groups of Administrative Controls

A
  1. Policies and Procedures 2. Personnel Security, evaluation and clearances 3. Security policies 4. Monitoring 5. User management 6. Privilege management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BCP/DRP

A

Business continuity plan/disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RADIUS

A

Remote Authentication Dial In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Major Groups of Logical Controls

A
  1. Network Access 2. Remote Access 3. System Access 4. Application Access 5. Malware Control 6. Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Discretionary Access Controls (DACS)

A

Controls placed on data by the owner of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Mandatory Access Controls (MACS)

A

Controls determined by the system and based primarily on organizational policy. Data needs to be labeled as to its classification. Access permissions are applied to an object based on the level of clearance given to a subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Nondiscretionary Access Control
Based on assignment of permissions as defined by the administrator of a system
26
Access Control Matrix
An access control list in the form of a table - showing what permissions a user has for various system objects.
27
Rule-based Access Control
Specifies the privileges granted to user s(e.g read, write) when the specific condition of a rule is met - e.g. the time a certain file can be accessed.
28
Role-based Access Control
Based on job function - objects associated with a role will inherit privileges assigned to that role
29
RBAC
Non-RBAC - user granted access Limited RBAC - users mapped to roles within a single application Hybrid RBAC-role applied to multiple applications or systems, but instances wheresubjects assigned to roles defined within an application FUll RBAS - roles defined by organizational policy
30
Content Dependent Access Control
Based on content of data not roles
31
Constrained User interface
Restricting users to specific functions based on their role in the system - e.g. limiting menus, data views, encryption, etc
32
Capability Tables
Used to match subjects and their capabilities - read, write
33
Temporal Isolation
Activities may be restricted on when they can be performed
34
Identification
Assertion of a unique identity for a person or system and is the starting point of access control. - Uniqueness
35
Authentication
The process of verifying the identity of the user - Validity
36
Authorization
Process of defining the specific resources a user needs and determining the type of assess to those resources the user may have. - Control
37
MAC Address
Media Access Control - 48-bit number - machine address - now can be set in software so no longer can be considered a strong identifier
38
IP Address
Logical location of a device on the IP network - assigned in software
39
RFID
Radio Frequency Identification - small label that can be embedded in almost any object - they can be read from a distance
40
Email Address
globally unique - enforced by convention
41
User Identification Guidelines
User identification must be unique; user identification should be non-descriptive and disclose as little as possible about the user; user identification must be secure; and the final process must be logged and documented so that it can be verified and audited.
42
Identity Management
refers to a set of technologies intented to offer greater efficiency in the management of a diverse user and technical environment
43
Challenges for Identity Management Solutions
Consistency; usability; reliability; and scalability
44
Centralized Access Control Systems
RADIOS and TACACS+(Terminal Access Controller Access-Control System Plus)
45
Authentication Methods
By knowledge (knows); by possession (has); by characteristic (is); and geolocation (where)
46
Single - factor authentication
user id and password
47
Two - factor authentication
user id, password, and fob
48
Three - factor authentication
user id, password, fob, and biometric
49
Secure passwords
typically hashed; a hash function takes an arbitrary amount of data as input and, through the use of a mathematical algorithm, will produce a unique, fixed-length representation of the data as output. Hash is a one-way function.
50
Authentication by Posession
Asynchronous token - challenge response technology; sychronous is based on an event, location, or time based sychronization between the requestor and the authenticator
51
Memory Card
Holds information but cannot process information. e.g users swipes card and enters a PIN. Data stored on the card is not protected.
52
Smart Card
Embedded semiconductor chip that accepts, stores and sends information.ICC (integrated circuit card). Based on ISO 7816-2 there are 8 electrical contacts - six are currently used. Can be used in Proximity of a reader.
53
Biometrics
Physical (finger print) and behavioral (voice pattern). Most common -finger prints. tend to provide higher security than other methods - higher strength
54
Hand Geometry
tension in the tendons, temperature, finger length, bone length, and hand width.
55
Palm Scans
combination of hand geometry and fingerprint analysis
56
Face Individuality
Iris, Retina (blood vessels back of the eye), entire face (facial geometry and heat signatures
57
Vascular Scan
veins in hands or face - relatively new
58
Keystroke Dynamics
stroke speed, acceleration, deceleration and pen pressure
59
False Reject Rate
when authorized users are falsely rejected
60
False Acceptance Rate
when unautorized users are falsely accepted
61
CER
Crossover Error Rate - amount to adjust sensitivity and maximul acceptable level of change - organization will need to determine based on its overall risk tolerance
62
Session Management
single instance of identification and authentication are applied to resources
63
Session hijacking
A form of "man in the middle" attack
64
Accountability
ability to determine who or what is responsible for an action and can be held responsible
65
Repudiation
is the ability to deny an action, event, impact or result
66
Password management
Require users to change passwords, lockout mechanisim, self-registration process aids
67
Account Management Systems
Central facility, workflow, automatic replication, facility for loading batch changes, automatic creation, change, or removal of access to system resources
68
Profile Management
collection of information associated witha particular identity or group.
69
Directory Management
centralized collection of user data
70
Directory Technologies
X.500, LightWeight Directory Access Protocol (LDAP), Active Directory and X.400
71
X.500
developed by the Interantional Telecommunications Union (ITU-IT) - initially worked with OSI to operates over TCP/IP as well. 4 protocols: Directory Access Protocol, Directory system protocol, directory information sharing protocol, and the directory operational binding management protocol. Hierarchial database with a key field of distinguished name (DN)
72
LDAP
Provides simpler implementation - hierarchial, operates in client/server architecture, typically runs over unsecured network using TCP port 389. Version 3 of LDAP - suports TLS to encrypt or use of TCP port 636 over an SSL connection
73
Active Directory
LDAP for Micorsoft-based environments, provides central authentication and authorization capabilities - organized in forest and trees - forest is a collection of all the objects and their associated attributes and trees are logical groupings of one or more AD security domains within a forest. Domains are identified by their DNS name. Objects are grouped by Organizational units.
74
X.400
ITU-T guidelines for exchange of e-mail - known as messaging handling system. Supports message transfer and message storage - supplanted in recent years by SMTP
75
Single Sign-on
SSO reduced sign-on or federated ID management - script based single sign-on - aids with leagacy technology
76
Kerberos
three-headed dog: authentication, authorization, and auditing. Security system using secret key cyrptography - users must have a unique ID for each application on the network. 4 requirements for access control - security, reliability, transparency, scalability. Based on symmetrical encryption and a secret key shared amongst the participants. Primary goal is to ensure private communiocations between systems over a network,
77
Kerberos Process
interaction between three systems: requesting system, the endpoint destination server, and the Kerberos or Key distribution center (KDC). Time-sensitive
78
KDC
serves two functions during the authentication transaction: as an authentication sever and as a ticket-granting server. Maintains database of the secret keys of all the participants
79
Realm key
a common key used for intitial trusted communication - then unique key is created to support future communications - common to use a hash of the user's password as the unique user key
80
TGT
Ticket granting ticket - user will receive once authenticated with AS along with session encryption key
81
Secure European System for Application in a Multi-Vendor Environment (SESAME)
offers single sign-on services and uses both symmettic and asymmetric cryptographic techniques Key attributes: single sign-on,role based access control, use of privileged attribute certificate (PAC), use of Kerberos Version5 protocol to access SESAME components, use of public key cryptography for distribution of secret keys
82
Web Accessed Management
WAM - replace sign-on process in affiliated WEB applications, typically by using a plug-on service on the Web server hosting the portal to the member applications.
83
Federated Identity Managment
Each organization subscribes to a common set of policies, standards, and procedures for the provisioning and managment of user identification, authentication, and suthorization information, as well as a common process for access control for systems these users must access. Uses cross-certification model for trust but once it goes beyond a small number it becomes very complex. Use of a third party bridge model is an alternative to the cross-sertification model.The third party is considered trust worthy - good for a large number of organizations.
84
OIUA
once in unlimited access
85
Auditing Events
Network events, System events, Application events, User Actions, and Keystrole Activity
86
Unix System Keystroke Activity
logging files are found in the user's $HOME directory with names like ".history", "sh\_history"
87
IDS
Intrusion detection system - part of a network device or dedicated device - does not take any action on the problem. Considered network monitoring
88
IPS
Intrusion prevention system - will take proactive prevention action - responds in real time to an event at the system or network layer. Considered an access control.
89
SIEM
Security Information and Event Management - aggregates information about access controls and selected system activity to store for analysis and correlation.
90
Denial of Service
DoS - consumption of resources preventing useful processesing and interrurption of network resources to preventing communication rendering a system unusable - SYN floods - attackers makes an overwhelming number of session initiation requests - TCP/IP protocol
91
Tear Drop
exploits how operating systems managed fragmented IP packets - overlap fragmented packets causing a flaw in the system - shutting it down
92
DDoS
Distributed denial of service - attacks a server from thousands of locations
93
Buffer overflows
buffer temporarily stores information for processing - an attack manipulates the system's ability to manage its buffers. - Can also be used to inject malicious code - used to gain unauthorized access or to escalate privileges.
94
Mobile Code
transmitted across network from remote source - ActiveX controls, Java applets, Java Script code from a Web page and HTML based email
95
Malicious software
Virus - parasitic code which attaches itself to another program; worm - self-propogating code; trojan horse - appear desireable but contain something harmful; spyware - used to deploy malware, collect private data, send advertising;
96
Password crackers
if attacker has obtained hashed password file using brute force attacks to compare combinations
97
Martin Hellman
developed public key cryptography with Whitfield Diffie
98
Phillip Oechslin
faster method of organizing hased chain - rainbow chain
99
Spoofing/Masquerading
With IP protocol alter source to a trusted IP - remove the assurance that a person is dealing with a trusted entity.
100
Kevin Mitnick
popularized tecnique of IP spoofing
101
sniffers
collection information from a communication medium like a network
102
Emanations
proliferation of electromagnetic signals given off by electronic devices
103
Tempest
late 1960s - Government program studies compromising emanations - equipment should be located in center of building possibly protected by a Faraday cage (wrapped in wire mesh) - restricts signal leakage
104
Shoulder surfing
direct observation - seeing a password typed in
105
Object Reuse
residual data should be cleared - print only one user's output at a time
106
Data remanence
remains of partial data or even the entire set of digital information
107
FAT
File allocation table maintains physical location and often when files are deleted the information is removed form the FAT but the actual data is still residing on the drive.
108
Slack space
space at the end of a file - it can be used by hacker's to store information
109
Data mining
act of collecting and analyzing large quantities of information to determine patterns of use of behavior and use those patterns to form conclusions
110
Dumpster diving
taking what peopl assume is trash - cross cut shredders are more effective
111
Backdoors and Trap doors
special access capabilities put in by developer
112
Logic bombs
results of attacks can be delayed for a long period of time - logical progression of events before they unleash theri aggression.
113
Theft
physical theft - anything o f value can be removed, digital theft - copies of data
114
Social Engineering
practice of misdirection to obtain information through social contact
115
Threat Modeling
using scenario analysis with knowledge of threats and vulnerabilities to help determine what risks ares present in a system or application and where to apply resources to ensure the best mitigation for the value
116
Formula for risk
impact vs. likelihood
117
Asset Valuation
Hardware, Software, Integration, Opportunity COst, Regulatory exposure (Civil/Criminal), Information replacement, reputational exposure
118
SLE=AV x EF
Single loss expectancy = asset value x exposure factor (estimate how much an asset will decline %wise)
119
ALE= SLE x ARO
Annualized loss exposure = single loss expectancy x Annualized rate of occurrence
120
Penetration Test methodology
reconnaissance, enumeration, vulnerability analysis,execution, document findings
121
Identity and Access Provisioning Life Cycle
Provisioning, Review, Revocation
122
A preliminary step in managing resources is A. Conducting a Risk Analysis B. Defining who can access a given system or information C. Performing a business impact analysis D. Obtaining top management support
B. Defining who can access a given system or information
123
Which best describes Access controls? A. Access controls are a collection of technical controls that permit access to authorized users, systems, and applications B. Access controls help protect against threats and vulnerabilities by reducing exposure to unauthorized activities an providing access to information and systems to only those who have been approved C. Access Control is the employment of encryption solutions to protect authentication information during log-on D. Access Controls help protect against vulnerabiliteis by controlling unauthorized access to systems and information by employees, partners and customers
B. Access controls help protect against threats and vulnerabilities by reducing exposure to unauthorized activities an providing access to information and systems to only those who have been approved
124
\_\_\_\_\_ requires that a user or process be granted access to only those resources necessary to perform assigned functions A. Discretionary Access Control B. Separation of Duties C. Least Privilege D. Rotation of Duties
C. Least Privilege
125
What are the 7 main categories of access control? A. Detective, Corrective, monitoring, logging, recover, classification, and directive B. Directive, deterrent, preventative, detective, corrective, compensating and recovery C. Authorization, identification, factor, corrective, privilege, detective, and directive D. Identification, authentication, authorization, detective, corrective, recovery, an directive
B. Directive, deterrent, preventative, detective, corrective, compensating and recovery
126
What are the three types of access controls? A. Adminstrative, Physical and technical B. Identification, authentication, and authorization C. Mandatory, discretionary, and least privilege D. Access, management, and monitoring
A. Adminstrative, Physical and technical
127
WHich approach revolutionized the process of cracking passwords? A. Brute Force B. Rainbow table Attack C. Memory tabling D. One-time Hashing
B. Rainbow table Attack
128
What best describes two-factor authentication? A. A hard token and a smart card B. A user name and a pin C. A password and a pin D. A pin and a hard token
D. A pin and a hard token
129
A potential vulenrabilty of kerberos authentication server is A. Single Point of Failure B. Asymmetric key compromise C. Use of dynamic passwords D. Limited lifetimes for authentication credentials
A. Single Point of Failure
130
In mandatory access control the system control access and the owner determines A. Validation B. Need to know C. Consensus D. Verification
B. Need to know
131
Which is the least significant issue when considering biometrics? A. Resistance to counterfeiting B. Technology type C. User acceptance D. Reliability and Accuracy
B. Technology type
132
Which is a fundamental disadvantage of biometrics? A. Revoking credentials B. Encryption C. Communication D. Placement
A. Revoking credentials
133
Role based access control A. Is unique to mandatory access control B. Is independent of owner input C. Is based on user job function D. Can be compromised by inheritance
C. Is based on user job function
134
Identity management is A. Another name for access controls B. Technologies and processes intended to offer greater efficiency in the management of a diverse user and technical environment C. Technologies and processes focused on the provisioning and decommissioning of user credentials D. Technologies and processes used to establish trust relationships with disparate systems
B. Technologies and processes intended to offer greater efficiency in the management of a diverse user and technical environment
135
A disadvantage of single sign on is A. Consistent time-out enforcement across platforms B. A compromised password exposes all authorized resources C. Use of multiple passwords to remember D. Password change control
B. A compromised password exposes all authorized resources
136
Which of the following is incorrect when considering privilege management? A. Privileges associated with each system, service or application and the defined roles within the organization to which they are needed, should be identified and clearl documented B. Privileges should be managed based on least privilege. Only rights required to perform a job should be provided to a user, group or role C. An authorization process and a record of all privileges allocated should be maintained. Privileges should not be granted until the authorization process is complete and validated D. Any privileges that are needed for intermittent job functions should be assigned to multiple user accounts, as opposed to those for normal system activity related to the job function
D. Any privileges that are needed for intermittent job functions should be assigned to multiple user accounts, as opposed to those for normal system activity related to the job function
137
Threat modeling is the process of A. Determining which threats to neutralize first B. Developing access controls that compensate for the vulnerabilities C. A risk assessment approach in whihc decisions are based on risk and value D. Scenario analysis targeted towards determining the best approach for threat elimination
C. A risk assessment approach in whihc decisions are based on risk and value
138
When reviewing user entitlement the security professional must be most aware of A. Identify management and disaster recovery capability B. Business or organizational processess and access aggregation C. The organizational tenure of the user requesting entitlement D. Automated processes which grant users access to resources
B. Business or organizational processess and access aggregation
139
Which formula represents ALE or annual loss exposure? A. ALE = SLE \* ARO B. SLE = ARO \* ALE C. SLE = SRO \* EF D. ALE = EF \* SLE
A. ALE = SLE \* ARO
140
In constructing a continuous monitoring system, numerous feeds from several systems must be correlated and analyzed. Which of the following best provides the capability? A. Intrusion Prevention System B. Identity Management and Access Control System C. Intrusion Detection System D. Security Information and Event Management
D. Security Information and Event Management
141
A guard dog patrolling the perimeter of a data center is what type of control? A. Recovery B. Administrative C. Logical D. Physical
D. Physical