CHAPTER 3 SUMMARY Flashcards
User Provisoning
User Provisioning - The process of creating, maintaining and deactivating user identities on a system.
Technical controls
Technical Controls - The security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software or firmware components of the system.
Subject
Subject - Generally an individual, process or device causing information to flow among objects or change to the system state.
Segregation of Duties
Segregation of Duties - The practice of ensuring that an organizational process cannot be completed by a single person; forces collusion as a means to reduce insider threats. Also commonly known as Separation of Duties.
Rule
Rule - An instruction developed to allow or deny access to a system by comparing the validated identity of the subject to an access control list.
RABC
Role-based access control (RBAC) - An access control system that sets up user permissions based on roles.
Ransomware
Ransomware - A type of malicious software that locks the computer screen or files, thus preventing or limiting a user from accessing their system and data until money is paid.
Privileged Account
Privileged Account - An information system account with approved authorizations of a privileged user.
Principle of least privilege
Principle of Least Privilege - The principle that users and programs should have only the minimum privileges necessary to complete their tasks
Physical Acess Controls
Physical Access Controls - Controls implemented through a tangible mechanism. Examples include walls, fences, guards, locks, etc. In modern organizations, many physical control systems are linked to technical/logical systems, such as badge readers connected to door locks.
Object
Object - Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information. Access to an object (by a subject) implies access to the information it contains.
MAC
Mandatory Access Control - Access control that requires the system itself to manage access controls in accordance with the organization’s security policies.
LAC
Logical Access Control Systems - An automated system that controls an individual’s ability to access one or more computer system resources, such as a workstation, network, application or database. A logical access control system requires the validation of an individual’s identity through some mechanism, such as a PIN, card, biometric or other token.
Logging
Logging - Collecting and storing user activities in a log, which is a record of the events occurring within an organization’s systems and networks.
Log Anomaly
Log Anomaly - A system irregularity that is identified when studying log entries which could represent events of interest for further surveillance.