Chapter 2: Access Control Attacks and Monitoring Flashcards
What is a risk?
A risk is the possiblity or likelihood that a threat will exploit a vulnerability resulting in a loss such as harm to an asset.
What is a threat?
A threat is a potential occurrence that can be caused by anything or anyone and can result in an undesirable outcome.
What is a vulnerability?
Any type of weakness.
What is threat modeling?
The process of identifying, understanding, and categorizing potential threats. Threat modeling should begin early in the design process of a system and continue through its life cycle.
What is SD3+C, and what are its goals?
A motto which states: “Secure by Design, Secure by Default, Secure in Deployment and Communication”.
Its goals are:
- To reduce the number of security-related design and coding defects.
- To reduce the severity of any remaining defects.
What are the approaches to threat modeling?
- Focused on assets
- Focused on attackers
- Focused on software
What is vulnerability analysis?
Attempting to discover weaknesses in systems against potential threats. It’s an ongoing process including both technical and administrative steps.
What is a dictionary attack?
A dictionary attack is an attempt to discover passwords by using every possible word in a predefined databas.
What is a one-upped constructed password?
A password in which a single character differs from its original form. password -> password1, for example.
What is a brute force attack? A hybrid attack?
A brute force attack attempts to discover passwords by trying all possible combinations. A hybrid attack attempts a dictionary attack first, then moves on to brute forcing.
What is a rainbow table?
A large database of precomputed hashes for guessed passwords.
How do you combat rainbow tables?
Use salt.
What is salt?
Additional random bits added to a password before hashing it. This can dramatically increase the size needed for rainbow tables.
What are the methods to prevent access control attacks?
- Control physical access to systems
- Control electronic access to password files
- Encrypt password files
- Create a strong password policy.
- Use password masking
- Deploy multifactor authentication
- Use account lockout controls
- Use last logon notification
- Educate users about security
- Audit access controls
- Actively manage accounts
- Use vulnerability scanners
What are access review audits for?
Checking that users do not have excessive privilieges and that accounts are managed appropriately.