Chapter 6 - Access Controls Flashcards

1
Q

Access Control

A

Protecting a resource so that it is only accessed by those allowed to use it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Parts of four-part access control

A
  1. Identification
  2. Authentication
  3. Authorization
  4. Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policy definition phase

A

Define who has access and which resources they can use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policy enforcement phase

A

Reject or grant requests for access based on authorizations from the definition phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two types of access controls

A
  1. Physical
  2. Logical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical access controls

A

Control entry into a building or other protected area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of physical access controls

A

Smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logical access controls

A

Control entry into a computer system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Example of logical access controls

A

Pin or biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The security kernel is what?

A

The central point of access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security kernel (Definition)

A

permits access when conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Components of access control

A

Users, resources, actions, and relationships (conditions between users and resources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Synchronous token

A

Use time or events to synchronize with an authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asynchronous token

A

uses a challenge-response mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of biometrics

A

dynamic and static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dynamic biometrics examples

A

voice inflections or keyboard strokes (what you do)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Static biometrics examples

A

fingerprints, facial recognition (what you are)

18
Q

Advantages of biometrics

A

person must be physically present, difficult to fake, don’t have to worry about lost IDs or forgotten passwords

19
Q

Disadvantages of biometrics

A

physical characteristics may change, required devices are expensive

20
Q

Single sign-on (SSO)

A

sign onto a computer or network once and then be allowed access into all computers and systems where authorized

21
Q

Advantages of SSO

A

Efficient, reduces human error, locks out users with too many failed attempts

22
Q

Disadvantages of SSO

A

compromised passwords grant complete access to an intruder, limited security, authentication server can become a single point of failure

23
Q

Identification

A

who is trying to gain access?

24
Q

Authentication

A

can their identities be verified?

25
Q

Authorization

A

what can the requestor access and modify

26
Q

Accountability

A

how are actions traced to an individual to ensure that the person who does them can be identified

27
Q

Discretionary access controls (DAC)

A

owner of a resource decides who can access it

28
Q

Mandatory access controls (MAC)

A

determines level of restriction by sensitivity of resource using classification labels

29
Q

MAC and NAC are

A

Stronger than DAC

30
Q

Nondiscretionary access controls (NAC)

A

access rules are closely managed by the security administrator, not the owner or other users

31
Q

Rule-based access control

A

explicit rules grant access

32
Q

Role-based access control

A

grants access based on a user’s role in an organization

33
Q

Credential and permissions management

A

systems that provide the ability to collect, manage, and use information associated with access control

34
Q

Private cloud computing

A

all components are managed by the organization

35
Q

Community cloud computing

A

Components are shared by several organizations

36
Q

Public cloud computing

A

Available for public use and managed by third-party providers

37
Q

Hybrid cloud computing

A

Contains components of more than one type of cloud

38
Q

Advantages of cloud computing

A

No need to maintain a data center or disaster recovery site

39
Q

Disadvantages of cloud computing

A

More difficult to keep data secure, greater potential for data leakage

40
Q

Multi-factor authentication

A

Requires you to provide a combination of two or more factors in order to verify your identity

41
Q

Types of factors for MFA

A

Something you know (such as a password)
Something you have (such as a smartphone)
Something you are (such as facial recognition)