Chapter 14 - Controlling And Monitoring Access Flashcards

1
Q

Identity based access control model

A

A discretionary access control model is an identity-based access control model. It allows the owner (or data custodian) of a resource to grant permission at the discretion of the owner. The role-based access control is based on role or group membership. The rule-based access control model is based on rules within an ACL. The mandatory access control model uses assigned labels to identify access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Main differences between discretionary and no discretionary access control model

A

The main difference is in how they are controlled and managed. Administrators centrally administer no discretionary access controls and can make changes that affect the entire environment. In contrast, discretionary access control models allow owners to make their own changes, and their changes don’t affect other parts of the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What best describes a characteristic of the mandatory access control model?

A

Prohibitive and it uses an implicit-deny philosophy (not an explicit-deny philosophy). It is not permissive and it uses labels rather than rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is being used to identify potential attackers/threats?

A

Threat modeling helps identify, understand, and categorize potential threats. Asset valuation identifies the value of assets, and vulnerabilities analysis identifies weakness that can be exploited by threats. An access review and audit ensures that account management practices support the security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difference between implicit deny and explicit deny

A

Implicit Deny is a method of controlling access to data by denying access to ALL data then granting only to what the user needs to do their jobs.

The converse being Explicit Deny where you only deny access for users for a smaller set of data and permit access to all other data. (Worst practice)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Microprobing

A

The use of needles to remove the outer protective material on the card’s circuits, by using ultrasonic vibrations. Once this is completed then data can be accessed and manipulated by directly tapping into the card’s ROM chips. This is considered an invasive attack that can be used against smart cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO standard created for smart card

A

ISO 14433

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtual Password

A

A virtual password is the length and format that is required by the application. For example, an application may require your virtual password to be 64 bits to be used as a key with the AES algorithm. Not all applications would require that passphrases be turned into key sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SAML, SOAP, and HTTP

A

As an example, when you log in to your company’s portal and double-click a link for Salesforce, your company’s portal will take this request and your authentication data and package it up in an SAML format and encapsulate that data into SOAP message. This message would be transmitted over an HTTP connection to the Saleforce vendor site, and once you are authenticated you can interact with vendor software. SAML packages up authentication data, SOAP packages up web service request and SAML data, and the request is transmitted over an HTTP connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Differences between combi card and hybrid card

A

The hybrid cards have a dual chip in them with the capabilities of utilizing both the contact formats and the contactless antenna model. They both have an antenna in order to work in contactless mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Extended TACACS (XTACACS)

A

XTACACS separates authentication, authorization, and accounting processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RADIUS authentication process

A

User dials into an access server, access server prompts user for credential, user enters credentials, access server forwards credential to RADIUS server, RADIUS server accepts or rejects request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web portal vs web portlets

A

Web portals are parts of a website that act as points of access to information in a unified manner. A web portal is made up portlets, which are pluggable user interface software components that present information from other systems. In addition, a portlet is an interactive application that provides a specific type of web services functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which model implements access control matrices to control how subjects interacts with objects?

A

DAC is implemented and enforced through the use of access control lists (ACLs), which are held in a matrix. MAC is implemented and enforced though the use of security labels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cookies

A

A cookie can be in the format of a text file stored on the user’s hard drive (permanent), or it can be held in memory only (session). If the cookie contains any type of sensitive information, it should only be held in memory and should be erased once the session has completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly