Chapter 3 mod 1 Flashcards
Acess control concepts, Physical Access control, Logical Access Controls
What does the term “control” refer to in the context of security?
In the context of security, a control is a safeguard or countermeasure designed to preserve Confidentiality, Integrity, and Availability of data, forming the CIA Triad.
What does Access Control involve, and what are its key components?
Access control involves limiting what objects can be available to what subjects according to what rules. The key components include objects, subjects, and rules.
What is the significance of the CIA Triad in security?
The CIA Triad (Confidentiality, Integrity, and Availability) is significant in security as it serves as the foundation for designing safeguards and countermeasures to protect data.
Can you provide 3 examples of a technical security control?
Firewalls,
intrusion detection systems (IDS),
encryption,
identification and authentication mechanisms
Can you provide 3 examples of an administrative security control?
Security education training and awareness programs;
A policy of least privilege
Bring your own device (BYOD) policies;
Password management policies;
Incident response plans
Can you provide 3 examples of a physical security control?
Fences
Cameras
Alarm Systems
Access Control Systems
Proper Lighting
Document and Equipment Disposal
Regular Audits of Systems
What is the central role of access controls in an information security program?
Access controls are considered the heart of an information security program because they regulate who can access organizational assets and what actions they can perform.
Define the term “subject” in the context of access controls.
In the context of access controls, a subject is any entity, such as a user, client, process, or program, that initiates a request for access to organizational assets.
Explain the concept of access based on three elements.
Access is based on three elements: subjects (entities requesting access), objects (entities being accessed), and rules (instructions determining access based on validated identities).
What distinguishes a subject from an object in access controls?
A subject is active and initiates requests for services, while an object is passive and responds to requests. Objects, such as devices or processes, do not contain their own access control logic.
Provide examples of subjects in the context of access controls.
Subjects can be users, processes, procedures, clients, programs, or devices like endpoints, workstations, smartphones, or removable storage devices with onboard firmware.
What is an object in the context of access controls, and how does it respond to requests?
An object is anything a subject attempts to access, such as a building, computer, file, or server. Objects are passive and respond to requests when called upon by a subject.
Explain the role of access control rules and provide an example.
Access control rules are instructions developed to allow or deny access to an object by comparing the validated identity of the subject to an access control list. For example, a firewall access control list might be used to determine access permissions.
How do objects in the access control context differ from subjects, and what is their ownership concept?
Objects are passive entities that respond to requests, while subjects initiate requests. Objects have owners who determine access rights, often recorded in rule bases or access control lists.
What is the purpose of a rule in access controls, and how does it determine access to an object?
An access rule is developed to allow or deny access to an object by comparing the validated identity of the subject to an access control list. It may define attributes to determine the appropriate level of access.
In the context of access controls, how can a rule apply time-based access?
A rule in access controls can apply time-based access by specifying conditions related to time, allowing or denying access to an object based on the specified timeframe.
What is the dependency of risk reduction on in the context of controls assessments?
Risk reduction depends on the effectiveness of the control, and it should be applicable to the current situation while adapting to a changing environment.
In the context of physical security, what is a key consideration when securing a repurposed area for confidential files?
A key consideration in securing a repurposed area is determining whether to install biometric scanners on doors, with a site assessment deciding the number of doors requiring this level of security.
How does a site assessment contribute to the decision-making process in physical security, specifically regarding door security?
A site assessment determines if all five doors need biometric scanners, helping decide whether to permanently secure, replace with a permanent wall, or use alternative security measures.
What is the primary factor that must align when implementing security controls in the described scenario?
The cost of implementing controls must align with the value of what is being protected, ensuring a balance between security measures and their associated expenses.
What considerations might influence the decision to install biometric scanners on all doors or opt for alternative security measures?
Considerations include the necessity of biometric scanners on all doors, budget constraints, and whether access to the area requires auditing, which can impact the choice of security controls.
Explain the potential alternatives to biometric scanners for securing doors in the described scenario.
Alternatives could include permanently securing doors, removing and replacing them with a permanent wall, or using simpler security measures like deadbolt locks, depending on the security requirements.
What is the significance of auditing access in the context of choosing security controls for the repurposed area?
Auditing access is important in determining the appropriate level of control. If auditing is unnecessary and multiple biometric locks are not needed, a simple deadbolt lock might suffice.
How does the concept of value aligning with cost apply to the implementation of security controls in the described scenario?
The cost of implementing controls must align with the value of the confidential files being protected, ensuring that the chosen security measures provide an appropriate level of protection without unnecessary expenses.
Explain the potential consequences of not aligning the cost of security controls with the value of what is being protected.
Failure to align the cost of security controls with the value of protected assets can result in either inadequate protection or unnecessary expenses, compromising the overall effectiveness of the security measures.
Define defense in depth in the context of information security.
Defense in depth is an information security strategy that integrates people, technology, and operational capabilities, establishing variable barriers across multiple layers to apply layered countermeasures and fulfill security objectives.
What does defense in depth aim to achieve, and what is its limitation?
Defense in depth aims to prevent or deter cyberattacks by applying multiple layered countermeasures but cannot guarantee the avoidance of an attack.
Provide a technical example illustrating defense in depth using multi-factor authentication.
In the context of defense in depth, a technical example involves multi-factor authentication, requiring a username/password and a code sent to a phone for identity verification, employing something you know and something you have as authentication layers.
How do multiple firewalls contribute to defense in depth, especially in a scenario with varying information sensitivity levels?
Multiple firewalls are used to separate untrusted networks from trusted networks housing sensitive data, ensuring network traffic validation by rules on more than one firewall, with the most sensitive information stored behind multiple firewalls.
Explain the concept of layered technical controls in defense in depth, using the example of multi-factor authentication.
Layered technical controls involve using multiple security layers, as seen in multi-factor authentication where username/password and a phone code verification are combined, making it more challenging for adversaries to obtain authentication codes individually.