Chapter 5: Identity and Access Management Part 2 - Section A Flashcards
Introduction: access control is often based on
Least privilege
Introduction: Computer access can be set for various levels (T or F)
True
Introduction: Access restrictions at the file level generally include what?
- Read, Inquiry, Copy
- Write, create, update, or delete only
- Execute only
- Combination
Introduction: What is the least dangerous type of access?
Read only
logical access controls mechanisms use what?
access control lists or access authorization tables
Access Control Lists: it refers to a register of?
- Users
- Access permitted
Access Control Lists: users also include groups and machine process (T or F)
True
Access Control Lists: Advanced ACLS access can be at the discretion of which 2 individuals and implemented by who?
- Policy Makers or User
- Security administrator
Access Control Lists: When users change jobs, their old access is often removed (T or F)
False. It is often NOT removed
Logical Access Security Administration: In a client-server environment I&A and authorization process can be administered in what ways?
Centralized and Decentralized
Logical Access Security Administration: Advantages of conducing security in a decentralized environment include
- Security Administration is ___ at the ___ location
- Security issues are resolved in a ___ manner
- Security controls are ____ on a ___ ___ basis
- onsite; distributed
- timely
- monitored; more frequent
Logical Access Security Administration: The risk associated with distributed responsibility for security administration includes:
- ____ ___ might be implemented rather than those required by the organization
- levels of security management might be ___ what can be maintained by a ___ ____
- ___ ___ and __ that are often provided by central admin to ensure standards are maintained might be ____
- Local Standards
- below; central admin
- Management checks and audits; unavailable
Logical Access Security Administration: There are many ways to control remote and distributed sites such as
- ______ over access to the computer, data files and remote access to the network should
be implemented. - The physical control environment should be as secure as possible, with additions, such as ____ ____ and a ___ ___ __
- Access from _____ locations via modems and laptops to other
microcomputers should be controlled appropriately - Opportunities for ___ ____ to gain ____ of the system should be limited by
implementing controls over access to ___ ___ ___ ___. - Controls should exist for data transmitted from __ ___
- When replicated files exist at multiple locations, controls should ensure that all files used are
___ and ____ and, when data are used to produce financial information, that no ____
arises.
- lockable terminals; locked computer room.
- remote
- unauthorized people; knowledge;system documentation and manuals
- remote locations
- correct and current;duplication
Remote Access Security: Remote access users can connect to their organization’s networks with the same level of functionality
that exists within their office (T or F)
True
Remote Access Security: What are the protocols used by remote access design?
- Transmission Control Protocol (TCP/IP)
- Systems network architecture (SNA) systems