CIA Triad and Access Control Flashcards
Define Access Control
Oversees the authorisation of users based on some security policy that the system adheres to. In essence, the AC model determines who can do what.
Define Confidentiality
Relates to the disclosure of information to unauthorised parties.
Define Integrity
Relates to preventing the modification of data or/and system assets to operate in a way other the one they that was intended by unauthorised parties
Define Availability
Relates to ensuring the availability of system resources to authorised parties.
What are the 3 methods of determining the Access Control of an entity?
Identification, Authentication, Authorisation.
Define Identification
The mapping of an identity to an entity. For example, a student ID card.
Define Authentication
The process of verifying the identification.
Define Authorisation
The granting or denying of access of an system entity to an object.
What are the four methods of Authentication?
Something you know; something you are; something you have; your location.
Give an example of a hard and soft token
Hard token : Key fob
Soft token : OTP
Give an example of a ‘Who you are’ authentication method. What is an issue with this?
Biometric markers. However, still replicable with effort.
What is multi-factor authentication?
An access control mechanism that uses two or more methods for providing authentication.
What makes for a strong authentication process? Give an example.
Using 2 or more different methods for authentication. For example, a PIN and a OTP uses what you know and what you have.
Define Access Control Model
A formal description of the concepts used to determine which permissions certain subjects have to objects.
Define Access Control Policy
Defines what is allowed / forbidden from a security perspective in a system.