Chapter 3 mod 3 Flashcards

1
Q

What is the fundamental difference between physical access controls and logical access controls?

A

Physical access controls are tangible methods restricting access to areas or assets, while logical access controls are electronic methods limiting access to systems and, at times, tangible assets or areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do logical access controls operate, and what is their primary focus?

A

Logical access controls operate electronically, focusing on restricting access to systems. They ensure that only authorized individuals, even if physically present, can gain logical access to specific assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three types of logical access controls and provide examples of their implementation.

A

Three types of logical access controls are:
Passwords
Biometrics (implemented on a system, e.g., on a smartphone or laptop)
Badge/token readers connected to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In what scenarios are logical access controls particularly effective, and how do they complement physical access controls?

A

Logical access controls are particularly effective in scenarios where individuals may have physical access but need restrictions on system access. They complement physical access controls by adding an additional layer of security, ensuring authorized individuals have the right to access specific assets electronically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the use of passwords contribute to logical access controls, and what is their role in electronic security?

A

Passwords contribute to logical access controls by serving as electronic credentials. They play a vital role in electronic security by restricting access to systems, ensuring that only individuals with the correct password can gain authorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the implementation of biometrics as a form of logical access control.

A

Biometrics, implemented on a system such as a smartphone or laptop, involves using unique physiological or behavioral characteristics to authenticate a user’s identity. This adds a layer of security by ensuring that only individuals with the correct biometric features can gain logical access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are badge/token readers connected to a system utilized for logical access control?

A

Badge/token readers connected to a system are used for logical access control by requiring individuals to present a valid badge or token to gain access. This electronic verification ensures that only those with the proper credentials can access the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is it essential to have both physical and logical access controls in place for comprehensive security?

A

Having both physical and logical access controls is essential for comprehensive security because physical controls restrict tangible access, while logical controls add an electronic layer of protection, ensuring that even those with physical access are authorized to use systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What role do logical access controls play in limiting unauthorized access to assets and information?

A

Logical access controls play a crucial role in limiting unauthorized access to assets and information by electronically restricting access to systems. This ensures that only individuals with the correct credentials can gain logical access, adding an extra layer of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do logical access controls contribute to the overall security of an organization’s electronic assets?

A

Logical access controls contribute to the overall security of an organization’s electronic assets by preventing unauthorized access to systems. They ensure that only authorized individuals can use electronic resources, protecting sensitive information and maintaining the integrity of digital assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Discretionary Access Control (DAC), and how does it differ from other access control policies?

A

Discretionary Access Control (DAC) is a specific type of access control policy enforced over all subjects and objects in an information system. In DAC, a subject with access can pass information to others, grant privileges, change security attributes, associate security attributes with new objects, and modify access control rules. This differs from other access control policies, such as mandatory access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key actions that a subject with access in a DAC system can perform regarding information and privileges?

A

In a DAC system, a subject with access can:
Pass information to other subjects or objects
Grant its privileges to other subjects
Change security attributes on subjects, objects, information systems, or system components
Choose security attributes for newly created or revised objects
Change the rules governing access control (with restrictions in mandatory access controls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does DAC grant users a high level of control over access to information in information systems?

A

DAC grants users a high level of control over access to information by allowing them to share or pass on files to others, essentially providing the user with a level of access similar to the original owner of the file. This flexibility is a characteristic of DAC systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In what way does DAC typically function in information systems, and what actions can a user with access to a file perform?

A

DAC typically functions in information systems by allowing a user with access to a file to share or pass it to someone else. The user can perform actions such as sharing the file, granting privileges, and modifying security attributes, resembling the level of access of the original owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What capabilities does a user have in a DAC system regarding the security attributes of newly created or revised objects?

A

In a DAC system, a user can choose the security attributes for newly created or revised objects. This means they have the authority to determine the security features associated with objects they create or modify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does DAC relate to rule-based access control systems, and what is a common characteristic they share?

A

Rule-based access control systems are usually a form of DAC. DAC and rule-based systems share the characteristic of allowing users significant control over access permissions, enabling them to define and manage access rules based on their discretion.

17
Q

What distinguishes DAC from mandatory access controls, particularly in terms of changing access control rules?

A

While DAC allows users to change access control rules, mandatory access controls restrict this capability. This distinction highlights that users in a DAC system have the discretion to modify rules governing access, a freedom limited in mandatory access control systems.

18
Q

What is the prevalence of DAC systems in the world of information systems?

A

Most information systems in the world are DAC systems, indicating the widespread adoption of Discretionary Access Control policies. This prevalence emphasizes the significance of allowing users discretion in managing access to information.

19
Q

What is Mandatory Access Control (MAC), and how does it differ from other access control policies?

A

Mandatory Access Control (MAC) is a policy uniformly enforced across all subjects and objects in an information system. Unlike other access control policies, only designated security administrators can modify security rules for subjects and objects, restricting subjects from unauthorized actions.

20
Q

How is MAC enforced in terms of security rule modification, and who has the authority to modify these rules?

A

MAC is uniformly enforced, allowing only designated security administrators, recognized as trusted subjects, to modify security rules for subjects and objects within the system. This ensures a centralized and controlled approach to rule modification.

21
Q

What distinguishes MAC from DAC in terms of who can control access within the information system?

A

The primary difference between MAC and DAC lies in who can control access. In MAC, it is mandatory for security administrators to assign access rights or permissions, whereas in Discretionary Access Control (DAC), it is at the object owner’s discretion.

22
Q

What actions are subjects constrained from performing in a system governed by MAC?

A

In a MAC system, subjects are constrained from:
Passing information to unauthorized subjects or objects
Granting their privileges to other subjects
Changing security attributes on subjects, objects, the information system, or system components
Choosing security attributes for newly created or modified objects
Changing the rules governing access control

23
Q

Who has the authority to assign a subset of total privileges for a subset of objects in a MAC system?

A

In a MAC system, designated security administrators have the authority to assign a subset of total privileges for a subset of objects. This centralizes control and ensures a consistent and secure approach to access permissions.

24
Q

How does MAC differ from DAC regarding the assignment of access rights to subjects?

A

In MAC, designated security administrators assign access rights or permissions to subjects, making it mandatory and centrally controlled. In contrast, DAC allows the object owner’s discretion in assigning access rights.

25
Q

Explain the role of security administrators in a MAC system and their responsibility for access control.

A

Security administrators in a MAC system are responsible for uniformly enforcing access control policies. Their role involves assigning and managing access rights or permissions, ensuring a centralized and controlled approach to security rule modifications.

26
Q

What are the limitations imposed on subjects in a MAC system in terms of changing security attributes or modifying rules?

A

In a MAC system, subjects are limited in their ability to change security attributes on subjects, objects, the information system, or system components. Additionally, they are restricted from choosing security attributes for newly created or modified objects and changing the rules governing access control.

27
Q

ow does MAC contribute to a more centralized and controlled approach to access management in an information system?

A

MAC contributes to a more centralized and controlled approach to access management by restricting the assignment of access rights to designated security administrators. This ensures consistency and security in the enforcement of access control policies.

28
Q

Why is the distinction between MAC and DAC crucial in understanding the control dynamics within an information system?

A

The distinction between MAC and DAC is crucial as it defines who has the authority to control access within an information system. Understanding this difference is essential for comprehending the centralized, mandatory nature of access control in MAC compared to the discretionary approach in DAC.

29
Q

Explain the concept of Role-Based Access Control (RBAC) and its application in the workplace.

A

RBAC provides each worker with privileges based on their role in the organization. Access to specific resources is determined by the employee’s role, ensuring a tailored and secure access structure within the workplace.

30
Q

Provide examples of how RBAC is implemented in an organization concerning different roles and their corresponding access privileges.

A

Examples of RBAC implementation include HR staff having access to personnel files, Finance having access to bank accounts, managers having access to their direct reports and department, and high-level administrators having comprehensive access. New employees typically start with minimal access required for their roles.

31
Q

Why is monitoring role-based permissions crucial in an organization, and what risks does inadequate monitoring pose?

A

Monitoring role-based permissions is vital to ensure that employees have the necessary access for their roles. Inadequate monitoring can lead to privilege creep, where individuals retain unnecessary permissions. Forgetting to adjust permissions can result in inappropriate access for new employees or those changing roles.

32
Q

Define privilege creep and explain how it can occur in an organization.

A

Privilege creep, or permissions creep, occurs when an individual’s permissions are expanded for a specific reason, but those permissions are not revoked when they are no longer needed. This can lead to individuals inheriting unnecessary access, posing security risks.

33
Q

Discuss the challenges associated with managing multiple roles and their permissions, especially in a dynamic work environment.

A

Managing multiple roles and permissions, particularly in a dynamic work environment, can be challenging. Changes in job responsibilities and personnel turnover require close monitoring to ensure employees have the necessary access without granting more permissions than needed.

34
Q

What is the significance of establishing standard roles and permissions in RBAC, especially when hiring or assigning new roles?

A

Establishing standard roles and permissions is crucial in RBAC to ensure consistency and security. When hiring or changing roles, it is recommended to create new users based on these standards rather than copying user profiles. This practice ensures that new employees start with appropriate roles and permissions.

35
Q

Explain why copying user profiles is discouraged in RBAC and how creating new users based on standard roles enhances security.

A

Copying user profiles is discouraged in RBAC because it can lead to inheriting unnecessary permissions. Creating new users based on standard roles ensures that new employees start with predefined and appropriate roles and permissions, reducing the risk of privilege creep.

36
Q

How can RBAC be a challenge in a constantly evolving job landscape, and what practices can help address this challenge?

A

In a dynamic job landscape, RBAC can be challenging to manage. To address this, it is essential to establish standard roles and permissions. Regularly reviewing and updating roles, along with avoiding the copying of user profiles, ensures that access aligns with current job requirements.

37
Q

What role does RBAC play in enhancing cybersecurity within an organization, especially in controlling and limiting access to sensitive information?

A

RBAC plays a crucial role in enhancing cybersecurity by controlling and limiting access to sensitive information. It ensures that employees only have access to resources necessary for their roles, reducing the risk of unauthorized access and potential security breaches.

38
Q

How does RBAC contribute to a more efficient and secure access management system in organizations?

A

RBAC contributes to efficiency and security in access management by providing a structured approach based on employee roles. This ensures that individuals have the necessary access for their responsibilities, minimizes the risk of privilege creep, and supports a well-defined and controlled access system.

39
Q
A