Chapter 12 - Access Management Flashcards

1
Q

Access control

A

The mechanism used in an information system for granting or denying approval to use specific resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

Checking the delivery persons credentials to be sure that they are authentic and not fabricated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

Granting permission to take an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting

A

A record that is preserved of who accessed the network, what resources they accessed, and when they disconnected from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Object

A

An object is a specific resource, such as a file of a hardware device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Subject

A

A subject is a user of a process functioning on behalf of the user that attempts to access an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Operation

A

The action that is taken by the subject over the object is called an operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control model

A

A predefined framework found in hardware and software that a custodian can use for controlling access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Discretionary access control (DAC)

A

The least restrictive access control model in which the owner of the object has total control over it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mandatory access control (MAC)

A

The most restrictive access control model, typically found in military settings in which security is of supreme importance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Role-based access control (RBAC)

A

A “real-world” access control model in which access is based on a users job function within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rule-Based Access Control

A

An access control model that can dynamically assign roles to subjects based on a set of rules defined by a custodian.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribute-Based Access Control (ABAC)

A

An access control model that uses more flexible policies that can combine attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Employee onboarding

A

The tasks associated when hiring a new employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employee offboarding

A

The tasks associated when an employee is released from the enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Location-based policies

A

Policies that establish geographical boundaries where a mobile device can and cannot be used.

17
Q

Time-of-day restriction

A

Limitation imposed as to when a user can log in to a system or access resources.

18
Q

Recertification

A

The process of periodically revalidating a users account, access control, and membership role or inclusion in a specific group.

19
Q

Permission auditing and review

A

A review that is intended to examine the permissions that a user has been given to determine if each is still necessary.

20
Q

Usage auditing and review

A

An audit process that looks at the applications that the user is provided, how frequently they are used, and how they are being used.

21
Q

Separation of duties

A

The practice of requiring that processes should be divided between two or more individuals.

22
Q

Job rotation

A

The act of moving individuals from one job responsibility to another.

23
Q

Clean desk policy

A

A policy designed to ensure that all confidential or sensitive materials are removed from a users workspace and secured when the items are not in use or an employee leaves her workspace.

24
Q

File system security

A

Security functions provided by access control lists (ACLs) for protecting files managed by the operating system.

25
Q

Database security

A

Security functions provided by access control lists (ACLs) for protecting SQL and relational database systems.

26
Q

Group-based access control

A

Configuring multiple computers by setting a single policy for enforcement.

27
Q

RADIUS (Remote Authentication Dial In User Service)

A

An industry standard authentication service with widespread support across nearly all vendors of networking equipment.

28
Q

Kerberos

A

An authentication system developed by MIT and used to verify the identity of networked users.

29
Q

TACACS+ (Terminal Access Control Access Control System)

A

The current version of TACACS authentication service.

30
Q

Directory service

A

A database stored on the network itself that contains information about users and network devices.

31
Q

Lightweight Directory Access Protocol (LDAP)

A

A protocol for a client application to access an X.500 directory.

32
Q

Security Assertion Markup Language (SAML)

A

An extensible markup language (XML) standard that allows secure web domains to exchange user authentication and authorization data.

33
Q

Extensible authentication protocol (EAP)

A

A framework for transporting the authentication protocols which was created as a more secure alternative to the weak CHAP/MS-CHAP.

34
Q

Challenge-Handshake Authentication Protocol (CHAP)

A

A weak version of Extensible Authentication Protocol (EAP).

35
Q

MS-CHAP

A

The Microsoft version of Challenge-Handshake Authentication Protocol (CHAP).

36
Q

Password Authentication Protocol (PAP)

A

A weak version of Extensible Authentication Protocol (EAP).