CIA Triad and Access Control Flashcards

1
Q

Define Access Control

A

Oversees the authorisation of users based on some security policy that the system adheres to. In essence, the AC model determines who can do what.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Confidentiality

A

Relates to the disclosure of information to unauthorised parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Integrity

A

Relates to preventing the modification of data or/and system assets to operate in a way other the one they that was intended by unauthorised parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Availability

A

Relates to ensuring the availability of system resources to authorised parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 methods of determining the Access Control of an entity?

A

Identification, Authentication, Authorisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Identification

A

The mapping of an identity to an entity. For example, a student ID card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Authentication

A

The process of verifying the identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Authorisation

A

The granting or denying of access of an system entity to an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four methods of Authentication?

A

Something you know; something you are; something you have; your location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give an example of a hard and soft token

A

Hard token : Key fob
Soft token : OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give an example of a ‘Who you are’ authentication method. What is an issue with this?

A

Biometric markers. However, still replicable with effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is multi-factor authentication?

A

An access control mechanism that uses two or more methods for providing authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What makes for a strong authentication process? Give an example.

A

Using 2 or more different methods for authentication. For example, a PIN and a OTP uses what you know and what you have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Access Control Model

A

A formal description of the concepts used to determine which permissions certain subjects have to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Access Control Policy

A

Defines what is allowed / forbidden from a security perspective in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the concepts of PEP and PDP across the security model. Why are they needed?

A

They enforce the access control model.
Policy Enforcement Points are implemented across layers of the Security Model. When receiving a request, the PEP communicates with the PDP to determine whether access is granted or not.

17
Q

What are 2 issues of Biometric markers?

A

If compromised can’t generate a new one.
As of today, all biometric types have been broken.

18
Q

What is the Access Control Matrix Model? Give examples of subjects and objects.

A

A model that defines the permissions of subjects on system objects.
Subjects can be users, groups, processes etc.
Objects can be data, files, memory etc.

19
Q

What are 4 issues with the ACMM?

A

Subjects of a system are very dynamic and high in numbers, thus the model is constantly changing and is large. This leads to:
Poor scalability, Complexity, Poor modifiability / maintenance, Slow look up,

20
Q

Define the RBAC Matrix Model. How does it resolve the ACMM issues?

A

Model assigns subjects (users) to roles. Roles are relatively static in a system, thus model is more scalable, modifiable, smaller, maintainable and less complex.

21
Q

Define Roles Hierarchy in the RBAC. Give an example.

A

Access rights can be seen as the sample space. Subsets of these access rights are given out based on the hierarchical standing of the role.