D3: Access Controls Flashcards
They dictate how subjects access _, adn their main goal is to protect the _ from _ _.
objects
objects; unauthorized access
Access controls can be (3):
1) physical
2) administrative
3) logical
Access control defines:
how users should be identified, authenticated, and authorized
Access control needs to be integrated into the core of operating systems through the use of _, _, and _ models
DAC
MAC
RBAC
How is access control enforced in the physical world?
security zones, network segmentation, locked doors, securit yguards
Access is…
a flow of information between a subject and an object
subject v. object
subject - aactive entity that requests access to an object
object 0 a passive entity
a subject can be a
user, program, process
Access controls are security features that are usually considered the _ _ _ _ in asset protection.
First line of defense
Name security mechanisms that provide confidentiality:
- encryption
- logical and physical access control
- transmission protogol
- database views
- controlled traffic flow
Name some identity management solutions:
- directories
- web access management
- passwrod management
- legacy single sign-on
- account management
- profile update
What is the benefit of password synchronization?
It reduces the complexity of keeping up with different passwords for different systems.
Benefits of self-service password reset:
Reduces help-desk call volumes by allowing users to reset their own passwords
What are the benefits for assisted password reset?
It reduces the resolution process for password issues for the help-desk department
What do IdM directories contain and what’s the purpose?
All resource information, user’s attributes, authorization profiles, roles, and possibly access control policies.
Other IdM applications have one centralized resource from which to gather this information
Automated workflow component is _ in account management products that provide IdM solutiosn
common
User provisioning refers to:
creation, maintenance, and deactivation of user objects and attributes, as they exist in one or more systems, directories, or applications
The HR database is usually considereed the authoritative source for:
user identities. This is where it is first developed and properly maintained
What are the three main access control models?
1 - discretionary
2 - mandatory
3 - role-based
DAC
Discretionary Access Control. Enables data owners to dictate what subjects have access to the files and resources they own.
MAC
Mandatory Access Control.
This model uses a security label system. Users have clearnaces, and resources have security labels that contain data classifications.
MAC systems compare these two attributes to determine access control capabilities.
Role-Based Access Control
Based on the user’s role and responsibiliteis (tasks) within the company
What are the three main tyapes of restricted interface measurements?
1 - menus and shells
2 - database views
3 - physically constrained interfaces
Access control lists are bound to _ and indicate what _ can use them.
objects
subjects
A capability table is bound to a _ and lists what _ it can access.
subject
objects
What are the two man ways that access control can be adminstered?
1 - centralized
2 - decentralized
Provided a decentralized administration access control example:
peer-to-peer working group
Provide some examples of centralized administration access control technologies:
RADIUS
TACACS+
Diameter
Provide examples of administrative controls:
- security policy
- personnel controls
- supervisory structure
- security awareness training
- testing