Chapter 3 mod 3 Flashcards
What is the fundamental difference between physical access controls and logical access controls?
Physical access controls are tangible methods restricting access to areas or assets, while logical access controls are electronic methods limiting access to systems and, at times, tangible assets or areas.
How do logical access controls operate, and what is their primary focus?
Logical access controls operate electronically, focusing on restricting access to systems. They ensure that only authorized individuals, even if physically present, can gain logical access to specific assets.
Name three types of logical access controls and provide examples of their implementation.
Three types of logical access controls are:
Passwords
Biometrics (implemented on a system, e.g., on a smartphone or laptop)
Badge/token readers connected to a system
In what scenarios are logical access controls particularly effective, and how do they complement physical access controls?
Logical access controls are particularly effective in scenarios where individuals may have physical access but need restrictions on system access. They complement physical access controls by adding an additional layer of security, ensuring authorized individuals have the right to access specific assets electronically.
How does the use of passwords contribute to logical access controls, and what is their role in electronic security?
Passwords contribute to logical access controls by serving as electronic credentials. They play a vital role in electronic security by restricting access to systems, ensuring that only individuals with the correct password can gain authorized access.
Explain the implementation of biometrics as a form of logical access control.
Biometrics, implemented on a system such as a smartphone or laptop, involves using unique physiological or behavioral characteristics to authenticate a user’s identity. This adds a layer of security by ensuring that only individuals with the correct biometric features can gain logical access.
How are badge/token readers connected to a system utilized for logical access control?
Badge/token readers connected to a system are used for logical access control by requiring individuals to present a valid badge or token to gain access. This electronic verification ensures that only those with the proper credentials can access the system.
Why is it essential to have both physical and logical access controls in place for comprehensive security?
Having both physical and logical access controls is essential for comprehensive security because physical controls restrict tangible access, while logical controls add an electronic layer of protection, ensuring that even those with physical access are authorized to use systems.
What role do logical access controls play in limiting unauthorized access to assets and information?
Logical access controls play a crucial role in limiting unauthorized access to assets and information by electronically restricting access to systems. This ensures that only individuals with the correct credentials can gain logical access, adding an extra layer of security.
How do logical access controls contribute to the overall security of an organization’s electronic assets?
Logical access controls contribute to the overall security of an organization’s electronic assets by preventing unauthorized access to systems. They ensure that only authorized individuals can use electronic resources, protecting sensitive information and maintaining the integrity of digital assets.
What is Discretionary Access Control (DAC), and how does it differ from other access control policies?
Discretionary Access Control (DAC) is a specific type of access control policy enforced over all subjects and objects in an information system. In DAC, a subject with access can pass information to others, grant privileges, change security attributes, associate security attributes with new objects, and modify access control rules. This differs from other access control policies, such as mandatory access controls.
What are the key actions that a subject with access in a DAC system can perform regarding information and privileges?
In a DAC system, a subject with access can:
Pass information to other subjects or objects
Grant its privileges to other subjects
Change security attributes on subjects, objects, information systems, or system components
Choose security attributes for newly created or revised objects
Change the rules governing access control (with restrictions in mandatory access controls)
How does DAC grant users a high level of control over access to information in information systems?
DAC grants users a high level of control over access to information by allowing them to share or pass on files to others, essentially providing the user with a level of access similar to the original owner of the file. This flexibility is a characteristic of DAC systems.
In what way does DAC typically function in information systems, and what actions can a user with access to a file perform?
DAC typically functions in information systems by allowing a user with access to a file to share or pass it to someone else. The user can perform actions such as sharing the file, granting privileges, and modifying security attributes, resembling the level of access of the original owner.
What capabilities does a user have in a DAC system regarding the security attributes of newly created or revised objects?
In a DAC system, a user can choose the security attributes for newly created or revised objects. This means they have the authority to determine the security features associated with objects they create or modify.
How does DAC relate to rule-based access control systems, and what is a common characteristic they share?
Rule-based access control systems are usually a form of DAC. DAC and rule-based systems share the characteristic of allowing users significant control over access permissions, enabling them to define and manage access rules based on their discretion.
What distinguishes DAC from mandatory access controls, particularly in terms of changing access control rules?
While DAC allows users to change access control rules, mandatory access controls restrict this capability. This distinction highlights that users in a DAC system have the discretion to modify rules governing access, a freedom limited in mandatory access control systems.
What is the prevalence of DAC systems in the world of information systems?
Most information systems in the world are DAC systems, indicating the widespread adoption of Discretionary Access Control policies. This prevalence emphasizes the significance of allowing users discretion in managing access to information.
What is Mandatory Access Control (MAC), and how does it differ from other access control policies?
Mandatory Access Control (MAC) is a policy uniformly enforced across all subjects and objects in an information system. Unlike other access control policies, only designated security administrators can modify security rules for subjects and objects, restricting subjects from unauthorized actions.
How is MAC enforced in terms of security rule modification, and who has the authority to modify these rules?
MAC is uniformly enforced, allowing only designated security administrators, recognized as trusted subjects, to modify security rules for subjects and objects within the system. This ensures a centralized and controlled approach to rule modification.
What distinguishes MAC from DAC in terms of who can control access within the information system?
The primary difference between MAC and DAC lies in who can control access. In MAC, it is mandatory for security administrators to assign access rights or permissions, whereas in Discretionary Access Control (DAC), it is at the object owner’s discretion.
What actions are subjects constrained from performing in a system governed by MAC?
In a MAC system, subjects are constrained from:
Passing information to unauthorized subjects or objects
Granting their privileges to other subjects
Changing security attributes on subjects, objects, the information system, or system components
Choosing security attributes for newly created or modified objects
Changing the rules governing access control
Who has the authority to assign a subset of total privileges for a subset of objects in a MAC system?
In a MAC system, designated security administrators have the authority to assign a subset of total privileges for a subset of objects. This centralizes control and ensures a consistent and secure approach to access permissions.
How does MAC differ from DAC regarding the assignment of access rights to subjects?
In MAC, designated security administrators assign access rights or permissions to subjects, making it mandatory and centrally controlled. In contrast, DAC allows the object owner’s discretion in assigning access rights.