Chapter 1: Access Control Flashcards
In Access Control, what is an object?
An object is a passive entity that provides information to active subjects.
In Access Control, what is a subject?
An active entity that accesses a passive object to receive information from or modify (with authorization) an object.
What are the three labels used in discussing objects?
User, owner, and custodian.
What is a user in the context of a subject?
Any subject that accesses objects on a system to perform some action or accomplish a work task.
What is an owner in the context of a subject?
The person who has final organizational authority for classifying objects and protecting and storing data.
What is a custodian in the context of a subject?
A custodian is a subject who has been assigned or delegated the day-to-day responsibility of properly storing and protecting objects.
What is the CIA triad?
The three categories of IT loss: confidentiality, integrity, and availability.
What is confidentiality?
Assurance that only authorized subjects can gain access to objects.
What is integrity?
Assurance that only authorized subjects can modify objects, and that unauthorized modifications are detected.
What is availability?
Authorized requests for objects must be granted in reasonable time.
Define permissions.
Permissions refer to access granted for an object and determine what you can do with it.
What is a security policy?
A document that defines the security requirements for an organization. It identifies security assets and the extent to which security solutions should protect them.
Define rights.
Rights refer to the ability to take an action on an object, such as modify system time or restore backed up data.
Define privileges.
The combination of rights and permissions.
What are the three primary types of access controls?
Preventive, detective, and corrective.
There are three primary types of access control and four others. What are the other four?
Deterrent, recovery, directive, and compensation.
What is a preventive access control?
An access control deployed to stop or thwart unwanted or unauthorized activity from occurring.
What is a detective access control?
An access control that is deployed to discover or detect unwanted or unauthorized activity.
What is a corrective access control?
An access control that returns systems to normal after an unwanted or unauthorized activity has occurred.
What is a deterrent access control?
An access control that is deployed to discourage violation if security policies. For example, policies, security training, fences, guards, and cameras.
What is a recovery access control?
An access control that is deployed to repair or restore resources, functions, and capabilities after a violation of security policies. An extension of corrective access controls, but with more advanced or complex abilities. Example: backups/restored, fault tolerant drive systems, clustering, antivirus.
What is a directive access control?
An access control that is deployed to direct, confine, or control the actions of subjects to force it encourage compliance with security policies. Notifications, monitoring, supervision.
What is a compensation access control?
An access control that is deployed to provide options to other existing controls to aid in enforcement and support of security policies.
What are the implementation categories of access controls?
Administrative, logical/technical, and physical.
What is an administrative access control?
Policies and procedures defined by an organization’s security policy and other regulations and requirements. Management controls. These focus on personnel and business practices.
What is a logical/technical access control?
Hardware or software mechanisms used to manage access and provide protection for resources and systems.
What are physical access controls?
Items you can physically touch that are deployed to prevent, monitor, or detect direct contact with systems or areas within a facility.
What is Defense-in-depth?
A strategy in which multiple layers or levels of access controls are deployed to provide layered security. Should use all of administrative, logical/technical, and physical controls.
What are the types if security elements that support access control?
Identification, authentication, authorization, and accountability.
Describe identification
When a subject professes an identity and accountability is initiated. User provides a username, for example.