Chapter 5 - Access Control Flashcards

1
Q

What are the three functions of access controls?

A

The three functions of access controls are:
Authentication - Assessing the identity of the supplicant.
Authorization - Giving permissions appropriate to the user.
Auditing - Collecting information about the user’s activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four bases for authentication credentials?

A

To be authenticated, you must show verifier credentials that are based on one of the following:

  • What you know (password/private key)
  • What you have (physical key/smart card)
  • Who you are (fingerprint/retina scan)
  • What you do (how you pronounce a passphrase)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is two-factor authentication’s promise? How can Trojan horses or man-in-the-middle attacks beat this?

A

Two factor authentication provides a form of defense-in-depth, which is a more complete protection. Unfortunately, a trojan horse can still act after full authentication has been achieved, and a man-in-the-middle can still act quickly as authentication is occurring to gain access as well with the credentials while they are valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is role-based access control? Why is it popular?

A

Role-based access control, or RBAC, is when a user’s access controls is based on the role they have in the system, such as buyer, editor, administrator, etc. Each role has its own set of access control rules, which are generally applicable to anyone that serves that role in the system. This is cheaper than individual application of rules, has less room for errors, and is far easier to revoke en-masse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why do technologically strong access controls not provide strong access control in real organizations?

A

As advanced as some of these technologies seem, they are always placed in the context of an organization, or of people being people. This means, basically, that people make mistakes, and the more people, the more likely the mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between mandatory access controls and discretionary access controls?

A

In mandatory access control, departments are not able to alter access controls that have been put in place by “higher authorities”. This is bad, because you’ll always need some flexibility.
In discretionary access control, which basically is mandatory access control, but departments have have discretion to give access to individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is multilevel security?

A

Multilevel security is where there is a system that has multiple levels of security restriction, from “declassified” to “top secret” and with levels in between.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are SBU documents?

A

SBU documents stand for “sensitive but unclassified”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is siting?

A

Siting refers to the placement of equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If cabling cannot be run through walls, what should be done with it?

A

Cabling that cannot be run through walls needs to be run through secured, armored conduits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are reusable passwords?

A

Reusable passwords are passwords that can be used repeatedly, for weeks or months at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is password cracking over a network difficult to do?

A

Generally, accounts are locked once a password authentication attempt has failed too many times. Installing a cracking program on a server bypasses this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are two ways password-cracking programs can be used?

A

Password-cracking programs can be used on-site, or by taking the password hashes off-site, at home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is it a problem to use the same password at multiple sites?

A

It is a problem to use the same password at multiple sites because if one site is compromised, they all are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is it difficult to enforce a policy of using a different password at each site?

A

It is difficult to enforce a policy of “different password at different site” because it’s difficult to remember that many passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are password reset questions difficult to create?

A

Password reset questions are difficult for various reasons:

  • Some questions are, themselves, security violations (asking for SSN).
  • Some questions are done by simple research.
  • Some questions may be difficult for the actual user to remember, involving opinions that might change.
  • Some questions may have spelling issues.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How may password resets be handled in high-risk environments?

A

In high-risk environments, password resets must sacrifice convenience for security, removing automated resets, or even help-desk call resets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the difference between magnetic stripe cards and smart cards?

A

Magnetic stripe cards are inactive, storing only data. Smart cards have microprocessors, and are active.

19
Q

What are one-time password tokens?

A

A one-time password token is a small device that displays a number that changes frequently, which is the current password.

20
Q

What are USB tokens?

A

USB tokens are like smart cards, but don’t require smart card readers.

21
Q

Why can PINs be short - only four to six digits - while passwords must be much longer?

A

PINs can be shorter than passwords because they must be entered locally, by hand.

22
Q

On what two things about you is biometric authentication based?

A

Biometric authentication is based on something you are (fingerprints, retinas) or something you do (write, type, talk, etc).

23
Q

What are the three scanner actions in biometric enrollment?

A

The three scanner processes in biometric enrollment are as follows:

  • The reader scans far too much data, as an enrollment scan.
  • The reader extracts key features from the scanned data.
  • The reader sends the key features to the database to be stored as a template.
24
Q

Why are key features not used, instead of a whole scan?

A

Key features are used instead of a whole scan because if the user scans or swipes with a new angle, it will be very different and invalid.

25
Q

What is a match index, and why is it important?

A

A match index is used to measure the variations between a scan’s key features and the template that is stored. If the scan is further off than the match index, it is rejected.

26
Q

What is error rate, in biometrics?

A

Error rate in biometrics refers to accuracy when the supplicant is not trying to deceive the system.

27
Q

What’s the difference between false acceptance and false rejection.

A

False acceptance occurs when the system makes a match to a template that should not be made. False rejection is the inverse.

28
Q

What is false acceptance rate and false rejection rate?

A

False acceptance rate is the percentage of false acceptances out of total access attempts. False rejection is the inverse.

29
Q

Why is false acceptance bad? Why is false rejection bad? Which is worse from a user acceptance standpoint? A security standpoint?

A

False acceptance could mean incorrectly labeling someone for access or restriction. In fact, false rejection falls under this as well.

From a security standpoint, false acceptance is worse. From a user acceptance standpoint, false rejection is worse.

30
Q

What is failure to enroll?

A

Failure to enroll occurs when the system fails to enroll a user, often for reasons like damaged fingerprints.

31
Q

What are the three major goals of biometric authentication?

A

The three major goals of biometric authentication are:
Verification - Verifying if someone is a particular person (they are providing the identity).
Identification - Verifies the identity of a supplicant (they are not providing the identity).
Watch Lists - Identify the person as a member of a group.

32
Q

What is the strongest form of authentication?

A

Crypographic authentication is the most secure form of authentication, if implemented correctly.

33
Q

List the functions of a PKI.

A

The functions of a PKI are as follows:

  • Create public key-private key pairs.
  • Distributing Digital Certificates
  • Accepting Digital Certificates
  • Revoking Digital Certificates
  • Provisioning
34
Q

Can a firm be its own certificate authority? What is the advantage of doing so?

A

Yes, but due to the labor involved, it is very expensive. The advantage is that firms then have control of trust in their entire public key infrastructure.

35
Q

Who creates a computer’s private key–public key pair?

A

The client or server generates the private key-public key pair.

36
Q

What is provisioning?

A

Provisioning is the accepting of public keys, and the providing of new digital certificates.

37
Q

What is the prime authentication problem?

A

The prime authentication problem says that unless individuals are carefully vetted before being allowed into the system, impostors can enroll through social engineering.

38
Q

What is the principle of least permissions?

A

Same as before, it’s the principle that people should only get the permissions they need to do their jobs.

39
Q

A(n) ________ is a statement from Firm A that Firm B should accept as true if Firm B trusts Firm A.

A

Assertion

40
Q

What is the difference between a ticket granting ticket and the service ticket within Kerberos?

A

The ticket granting ticket is given to the supplicant when it first logs into the Kerberos server. It allows the supplicant to log in to the Kerberos server later without needing authorization.
The service ticket is sent to the supplicant after being authenticated. When it is decrypted by the verifier host, it contains a session key that the supplicant uses to talk to the verifier, as well as permissions it should have on the verifier.

41
Q

What are directory servers?

A

Directory servers are central repositories for information about people, equipment, software, and databases. They also store authentication, authorization, and auditing information required for security. And host configurations, employee contact info, and tons of other stuff.

42
Q

What is LDAP’s purpose?

A

LDAP is made to retrieve and update information from directory servers.

43
Q

How do central authentication servers often get their authentication information? What is the advantage of this?

A

Central authentication servers often get their authentication information from directory servers. The advantage of this is that the directory servers provide centralization for information needed by central authentication servers.

44
Q

What are the three elements an assertion may have?

A

An assertion may have authenticity information, authorizations, or attributes (describing the party).