Chapter 5: Identity and Access Management Part 2 - Section A Flashcards
Introduction: access control is often based on
Least privilege
Introduction: Computer access can be set for various levels (T or F)
True
Introduction: Access restrictions at the file level generally include what?
- Read, Inquiry, Copy
- Write, create, update, or delete only
- Execute only
- Combination
Introduction: What is the least dangerous type of access?
Read only
logical access controls mechanisms use what?
access control lists or access authorization tables
Access Control Lists: it refers to a register of?
- Users
- Access permitted
Access Control Lists: users also include groups and machine process (T or F)
True
Access Control Lists: Advanced ACLS access can be at the discretion of which 2 individuals and implemented by who?
- Policy Makers or User
- Security administrator
Access Control Lists: When users change jobs, their old access is often removed (T or F)
False. It is often NOT removed
Logical Access Security Administration: In a client-server environment I&A and authorization process can be administered in what ways?
Centralized and Decentralized
Logical Access Security Administration: Advantages of conducing security in a decentralized environment include
- Security Administration is ___ at the ___ location
- Security issues are resolved in a ___ manner
- Security controls are ____ on a ___ ___ basis
- onsite; distributed
- timely
- monitored; more frequent
Logical Access Security Administration: The risk associated with distributed responsibility for security administration includes:
- ____ ___ might be implemented rather than those required by the organization
- levels of security management might be ___ what can be maintained by a ___ ____
- ___ ___ and __ that are often provided by central admin to ensure standards are maintained might be ____
- Local Standards
- below; central admin
- Management checks and audits; unavailable
Logical Access Security Administration: There are many ways to control remote and distributed sites such as
- ______ over access to the computer, data files and remote access to the network should
be implemented. - The physical control environment should be as secure as possible, with additions, such as ____ ____ and a ___ ___ __
- Access from _____ locations via modems and laptops to other
microcomputers should be controlled appropriately - Opportunities for ___ ____ to gain ____ of the system should be limited by
implementing controls over access to ___ ___ ___ ___. - Controls should exist for data transmitted from __ ___
- When replicated files exist at multiple locations, controls should ensure that all files used are
___ and ____ and, when data are used to produce financial information, that no ____
arises.
- lockable terminals; locked computer room.
- remote
- unauthorized people; knowledge;system documentation and manuals
- remote locations
- correct and current;duplication
Remote Access Security: Remote access users can connect to their organization’s networks with the same level of functionality
that exists within their office (T or F)
True
Remote Access Security: What are the protocols used by remote access design?
- Transmission Control Protocol (TCP/IP)
- Systems network architecture (SNA) systems
Remote Access Security: Users uses what to connect to a mainframe based legacy application
terminal emulation software
Remote Access Security: Support for remote connections include?
- Point-to-point modem connectivity
- Integrated Services Digital Network (ISDN)
- Dial-on-demand connectivity
- Dedicated lines
Common Connectivity Methods for Remote Access: what is the most cost effective approach for remote access and why?
TCP/IP uses the internet (public infrastructure) provided by the ISPs which reduce costs.
Common Connectivity Methods for Remote Access: To achieve over the internet remote access, what should the organization establish?
VPN
Common Connectivity Methods for Remote Access: Advantages of VPN include:
- Ubiquity (Common)
- ease of use
- cheap
- read,inquiry, or copy only access.
Common Connectivity Methods for Remote Access: Disadvantages of VPN include:
- less reliable than dedicated circuits
- lack of central authority
- difficult to troubleshoot
Common Connectivity Methods for Remote Access: VPNs can create holes in your security infrastructure (T or F)
True
Common Connectivity Methods for Remote Access: What can we employ to alleviate risks from using VPN
- Intrusion Detection System
- Virus Scanners
Common Connectivity Methods for Remote Access: What is a good practice for VPNs
- To terminate all VPNs to the same endpoint in a VPN Concentrator
- Do not accept VPNs directed at other parts of the network
Common Connectivity Methods for Remote Access: Dial Up lines (modem asynch point to point or ISDN) accesses what of an organization?
Network access server (NAS)
Common Connectivity Methods for Remote Access: What are the most common protocols for NAS
RADIUS - Remote Access Dial In User Service
TACACS - Terminal Access Controller Access Control Systems
Common Connectivity Methods for Remote Access: What is the common practice for NAS?
Terminate the call after recording the number and calling again after authentication
Common Connectivity Methods for Remote Access: NAS procedures can be circumvented through?
Call forwarding
Common Connectivity Methods for Remote Access: what type of dial up connectivity is least preferred from a security control pov is
Remote Access Server
Common Connectivity Methods for Remote Access: Advantages of dial-up connectivity:
- low cost
- familiarity
Common Connectivity Methods for Remote Access: Disadvantages of Dial-up
performance
Common Connectivity Methods for Remote Access: The saest remote access method is?
Dedicated lines
Common Connectivity Methods for Remote Access: Network Access server works in concert with?
Firewall and router configuration
Common Connectivity Methods for Remote Access: Dedicated lines are mostly used by?
branch/regional offices or with business partners
Common Connectivity Methods for Remote Access: How would an intruder access the data link?
compromise the telecommunication provider
Common Connectivity Methods for Remote Access: dedicated lines cost how much when compared to other typical connections
2 - 5x
Common Connectivity Methods for Remote Access: List all 6 risks of remote access
- Denial of Service
- Malicious third parties
- Misconfigured software
- misconfigured devices
- unsecured host systems
- unsecured computers of remote users
Common Connectivity Methods for Remote Access: List all 5 controls for remote access
- Policy and Standards
- Proper Authorization
- Identification and Authentication
- Encryption
- System and Network Management