Chapter 5 - Access Control Flashcards
What are the three functions of access controls?
The three functions of access controls are:
Authentication - Assessing the identity of the supplicant.
Authorization - Giving permissions appropriate to the user.
Auditing - Collecting information about the user’s activities.
What are the four bases for authentication credentials?
To be authenticated, you must show verifier credentials that are based on one of the following:
- What you know (password/private key)
- What you have (physical key/smart card)
- Who you are (fingerprint/retina scan)
- What you do (how you pronounce a passphrase)
What is two-factor authentication’s promise? How can Trojan horses or man-in-the-middle attacks beat this?
Two factor authentication provides a form of defense-in-depth, which is a more complete protection. Unfortunately, a trojan horse can still act after full authentication has been achieved, and a man-in-the-middle can still act quickly as authentication is occurring to gain access as well with the credentials while they are valid.
What is role-based access control? Why is it popular?
Role-based access control, or RBAC, is when a user’s access controls is based on the role they have in the system, such as buyer, editor, administrator, etc. Each role has its own set of access control rules, which are generally applicable to anyone that serves that role in the system. This is cheaper than individual application of rules, has less room for errors, and is far easier to revoke en-masse.
Why do technologically strong access controls not provide strong access control in real organizations?
As advanced as some of these technologies seem, they are always placed in the context of an organization, or of people being people. This means, basically, that people make mistakes, and the more people, the more likely the mistakes.
What is the difference between mandatory access controls and discretionary access controls?
In mandatory access control, departments are not able to alter access controls that have been put in place by “higher authorities”. This is bad, because you’ll always need some flexibility.
In discretionary access control, which basically is mandatory access control, but departments have have discretion to give access to individuals.
What is multilevel security?
Multilevel security is where there is a system that has multiple levels of security restriction, from “declassified” to “top secret” and with levels in between.
What are SBU documents?
SBU documents stand for “sensitive but unclassified”.
What is siting?
Siting refers to the placement of equipment.
If cabling cannot be run through walls, what should be done with it?
Cabling that cannot be run through walls needs to be run through secured, armored conduits.
What are reusable passwords?
Reusable passwords are passwords that can be used repeatedly, for weeks or months at a time.
Why is password cracking over a network difficult to do?
Generally, accounts are locked once a password authentication attempt has failed too many times. Installing a cracking program on a server bypasses this.
What are two ways password-cracking programs can be used?
Password-cracking programs can be used on-site, or by taking the password hashes off-site, at home.
Why is it a problem to use the same password at multiple sites?
It is a problem to use the same password at multiple sites because if one site is compromised, they all are.
Why is it difficult to enforce a policy of using a different password at each site?
It is difficult to enforce a policy of “different password at different site” because it’s difficult to remember that many passwords.
Why are password reset questions difficult to create?
Password reset questions are difficult for various reasons:
- Some questions are, themselves, security violations (asking for SSN).
- Some questions are done by simple research.
- Some questions may be difficult for the actual user to remember, involving opinions that might change.
- Some questions may have spelling issues.
How may password resets be handled in high-risk environments?
In high-risk environments, password resets must sacrifice convenience for security, removing automated resets, or even help-desk call resets.