Chapter 4: Identity and Access Management - Section B Flashcards
Access Control Software Introduction: What is the purpose of access control softwares?
Its purpose is to prevent unauthorized access and medication to organization data and the use of system critical functions
Access Control Software Introduction: To achieve the goal, it is necessary to apply access controls across critical layers of the IS architecture (T or F)
False. All layers must have access controls
Access Control Software Introduction: What layers has the greatest degree of protection
The Network and Platform/OS layers
Access Control Software Introduction: What do you call the Network and Platform layers and why?
General Support Systems. They make up the infrastructure which the database and application layers reside
Access Control Software Introduction: OS ACS is typically restricted to ____ ____ and interfaces with ___ ____ ____ ___ and resides in ___ ____ ____ that manage and control external access to organization’s networks
Privileged Users; network access control software; network layer devices
Access Control Software Introduction: OS Access control software interfaces with database and or application access controls to protect system libraries and user data sets
True.
What are the access control functions of general operating and/or application systems?
- Create or change user profiles.
- Assign user identification and authentication.
- Apply user logon limitation rules.
- Ensure users’ access is commensurate with their job responsibilities.
- Ensure notification concerning proper use and access prior to initial login.
- Create individual accountability and auditability by logging user activities.
- Establish rules for access to specific information resources (e.g., system-level
application resources and data). - Log events.
- Report capabilities
What are the access control functions of database and or application-level systems?
- Create or change data files and database profiles
- Verify user authorization at the application and transaction level
- Verify user authorization within the application
- Verify user authorization at the field level for changes within a database
- Verify subsystem authorization for the user at the file level
- Log database/data communications access activities for monitoring access
violations
General operation and application system access control: How do they create individua accountability and auditability?
By logging user activities
General operation and application system access control: Ensure notification concerning proper use and access after the initial login (T or F)
False. Prior to initial login
Database and/or application-level access control functions: Verifies user authorization at what levels?
Application and transaction level
Database and/or application-level access control functions : Verifies authorization changes within the database ata what level?
Field level
Database and/or application-level access control functions : Verifies subsystem authorization for the user at the ___ level
file
Access Control Software Summary: What are the upper and lower layers?
Upper: Database and Application Layers
Lower: Network and Platform/OS Layers
Access Control Software Summary: The lower layers are dependent on the Upper layers (T or F)
False. The opposite is true, the upper layers depend on the lower layers to protect the general system resources
Access Control Software Summary: Upper layers provide _____ at the application level in segregating duties by function
granularity
What is a critical building block of compute security because it is needed in all access control?
Identification and Authentication
Identification and Authentication: How does it establish user accountability?
Links activities on a computer system to specific individuals.
Identification and Authentication: Common Vulnerabilities include
- Weak authentication
- Simple passwords
- Potential to bypass authentication
- Lack of Confidentiality and integrity for the store authentication Information
- Lack of encryption on authentication and protection of information transferred over a network
- User’s lack of knowledge on the risk in sharing authentication elements
Identification and Authentication: I&A differ in respect to:
- Meaning
- Method, Peripherals, and Techniques
- Attributes
- Requirement in terms of secrecy and management (