Chapter 3: Access Control Concepts Flashcards

1
Q

Audit

A

Independent review and examination of records and activities to assess the adequacy of system controls to ensure compliance with established policies and operational policies and operational procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CPTED

A

Crime Prevention through Environmental Design (CPTED) - An architectural approach to the design of buildings and spaces which emphasizes passive features to reduce the likelihood of criminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defense in Depth

A

Information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC

A

Discretionary Access Control (DAC) - A certain amount of access control is left to the discretion of the object’s owner, or anyone else who is authorized to control the object’s access. The owner can determine who should have access rights to an object and what those rights should be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encrypt

A

To protect private information by putting it into a form that can only be read by people who have permission to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewalls

A

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Insider Threat

A

An entity with authorized access that has the potential to harm an information system through destruction, disclosure, modification of data, and/or denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layered Defense

A

The use of multiple controls arranged in series to provide several consecutive controls to protect an asset; also called defense in depth. 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Log Anomaly

A

Collecting and storing user activities in a log, which is a record of the events occurring within an organization’s systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logical Access Control System

A

An automated system that controls an individual’s ability to access one or more computer system resources, such as a workstation, network, application or database. A logical access control system requires the validation of an individual’s identity through some mechanism, such as a PIN, card, biometric or other token. It has the capability to assign different access privileges to different individuals depending on their roles and responsibilities in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mandatory Access Control

A

Access control that requires the system itself to manage access controls in accordance with the organization’s security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mantrap

A

An entrance to a building or an area that requires people to pass through two doors with only one door opened at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Object

A

Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information. Access to an object (by a subject) implies access to the information it contains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical Access Control

A

Controls implemented through a tangible mechanism. Examples include walls, fences, guards, locks, etc. In modern organizations, many physical control systems are linked to technical/logical systems, such as badge readers connected to door locks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Principle if Least Privilege

A

The principle that users and programs should have only the minimum privileges necessary to complete their tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Privileged Account

A

An information system account with approved authorizations of a privileged user.

17
Q

RBAC

A

Role-Based Access Control
An access control system that sets up user permissions based on roles.

18
Q

Rule

A

An instruction developed to allow or deny access to a system by comparing the validated identity of the subject to an access control list.

19
Q

Segregation of Duties

A

The practice of ensuring that an organizational process cannot be completed by a single person; forces collusion as a means to reduce insider threats. Also commonly known as Separation of Duties.

20
Q

Subject

A

Generally an individual, process or device causing information to flow among objects or change to the system state.

21
Q

Technical Controls

A

The security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software or firmware components of the system.

22
Q

User Provisioning

A

The process of creating, maintaining and deactivating user identities on a system.

23
Q

Security Controls

A

Security controls are safeguards or countermeasures that an organization can employ to avoid, counteract or minimize security risks.

24
Q

System-specific Controls

A

System-specific controls are security controls that provide security capability for only one specific information system.

25
Q

Common controls

A

Common Controls are security controls that provide security capability for multiple information systems.

26
Q

Hybrid controls

A

Hybrid controls have characteristics of both system-specific and common controls.

27
Q

ABAC

A

ABAC is an access control model that controls access to objects using rules that are evaluated according to the attributes of the subject, relevant objects, and attributes of the environment and action.

28
Q

CPTED

A

Crime prevention through Environmental Design is a multidisciplinary approach to deterring criminal behavior through environmental design. It includes strategies such as improving lighting, landscaping, and building design to reduce opportunities for crime.

For example, improving lighting in dark areas such as sidewalks or parking lots can deter potential criminals who prefer to operate in the shadows.