Chapter 17: Managing Identities and Access Flashcards

1
Q

access control mechanism

A

dictates how subjects access objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

reference monitor

A

abstract machine which mediates all access subjects have to objects: to ensure subjects have necessary access rights and to protect objects from unauthorized access and destructive modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

six main access control models

A

discretionary, mandatory, role-based, rule-based, attribute-based, risk-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC

A

discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

discretionary access control

A

data owners dictate what subjects have access to files and resources they own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

access control lists

A

bound to objects and indicate what subjects can use them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC

A

mandatory access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

mandatory access control model

A

uses a security label system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC model

A

users have clearances and resources have security labels with data classifications; MAC system compare these two attributes to determine access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IFTTT rules

A

if this, then that

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

most granular of the access control models

A

ABAC; Attribute-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XML

A

Extensible Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Extensible Markup Language

A

rules for encoding documents in machine-readable form for interoperability between various web technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SPML

A

Service Provisioning Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Service Provisioning Markup Language

A

automation of user management and access entitlement configuration for electronically published services across multiple provisioning systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAML

A

Security Assertion Markup Language; exchange of authentication and authorization data to be shared between security domains

17
Q

XACML

A

Extensible Access Control Markup Language

18
Q

Extensible Access Control Markup Language

A

declarative access control policy language in XML and a processing model which interprets security policies

19
Q

OAuth

A

open standard which allows a user to grant authority to some web resource, like a contacts database, to a third party

20
Q

OpenID Connect

A

authentication layer built on OAuth 2.0 protocol which allows transparent authentication and authorization of client resource requests

21
Q

Kerberos

A

client/server authentication protocol based on symmetric key cryptography which provides single sign-on (SSO) for distributed environments

22
Q

KDC

A

key distribution center; most important component within a Kerberos environment because it holds all users’ and services’ secret keys, provides an authentication service, and securely distributes keys

23
Q

TGT

A

ticket granting ticket; Kerberos users receive a TGT, which allows them to request access to resources through the TGS, which generates a new ticket with the session keys

24
Q

TGS

A

ticket granting service

25
Q

weaknesses of Kerberos

A

KDC is a single point of failure; susceptible to password guessing; session and secret keys are locally stored; KDC needs to always be available; management of secret keys is required

26
Q

Remote access control technologies

A

RADIUS, TACACS+, Diameter

27
Q

identity and access provisioning life cycle

A

provisioning, access control, compliance, configuration management, and deprovisioning

28
Q

system account

A

created by the operating system for use by a particular process, not by a human

29
Q

service account

A

system account for a process that runs as a service (i.e. it listens for and responds to requests from other processes)

30
Q

authorization creep

A

when a user gains too much access rights and permissions over time

31
Q

MSAs

A

managed service accounts; Active Directory domain accounts used by services and provide automatic password management

32
Q

Role-based access control reduces administrative burdens by …

A

administrator assigns permissions and rights to a role, and users are plugged into those roles; admin does not need to revoke or reassign permissions to individuals users as they change jobs

33
Q

challenge/response mechanism

A

asynchronous token

34
Q

capability- based access control system

A

subject (user) has to present an item (ticket, token, or key) which outlines what it can access. capability is tied to the subject for access control purposes

35
Q

specialized, require extensive administration, expensive, reduce user functionality

A

MAC (mandatory access control) and multilevel security

36
Q

ACLs

A

access control lists; can be modified to provide tighter access control; bound to objects and outline which operations specific subjects can carry out on them

37
Q

based on symmetric cryptography

A

Kerberos

38
Q

SOA

A

service-oriented architecture

39
Q

service-oriented architecture

A

allows team to create a centralized web portal and offer the various services needed by internal and external entities