Chapter 8-10: Access Control, Securing Hosts, Data and Specialized Systems Flashcards
In which access control method does the owner of each controlled object decide who can access it and what permissions they have. It is common in Windows and Unix-like operating systems.
Discretionary Access Control (DAC)
In which access control method do administrators assign security classifications, or labels, to each user and each resource. A user can only access a given resource if their labels are compatible.
Mandatory Access Control (MAC)
In which access control method is access determined by a set of rules configured by administrators. These can be static or dynamic and may be triggered by other events.
Rule-based access control
Which access control method is similar to MAC in that administrators define permissions, but instead of clearance levels, users are assigned to one or more roles?
Role-based access control (RBAC)
Which access control mode applies security attributes to resources, users, and environments, then defines policies governing combinations of those attributes?
Attribute-based access control (ABAC)
In DAC on Unix, what 3 numbers represent read, write and execute?
4 - Read
2 - Write
1 - Execute
Which form of malware attaches malicious code to another file, which both can do direct damage and spread itself to other running programs
Virus
Which form of virus can spread multiple ways and infect multiple types of files
Multipartite Viruses
Which form of malware spreads itself by exploiting system vulnerabilities?
Worm
Which form of malware is a compromised or malicious website designed to spread malware to its visitors? Some contain malicious scripts that exploit vulnerabilities in browsers or in plugins.
Drive-by-download
Which form of malware is a more sophisticated two-stage attack which is related to the drive-by download but targets a specific group or category of users?
Watering hole
Which payload is a hidden way into a system or application that bypasses standard authentication procedures?
Backdoor
Which payload invisibly installs a remote access program an attacker can later use to access the computer?
Remote Access Trojan (RAT)
Which payload is a more advanced form of backdoor which uses automated processes to establish and maintain remote control of an infected system?
Command and control
Which technology allows centralized management of mobile device security settings, software updates, performance tracking and troubleshooting?
Mobile device management (MDM)