Domain 1 - Access Control Flashcards
Is an active entity in an Information System
Subject
A Passive data file
Object
Is an access control that gives subjects full control of objects they
have been given access to, including sharing the objects with other subjects
Discretionary Access Control - DAC
System-enforced access control based on
subject’s clearances and object’s labels
Mandatory Access Control - MAC
Is an access control where subjects are grouped into roles and each
defined role has access permissions based upon the role, not the individual
Role-Based Access Control - RBAC
Its purpose is to allow authorized users access to appropriate data and
deny access to unauthorized users.
Access Control
is keeping data secret. Data must only be accessible to users who
have the clearance, formal access approval, and the need to know
Confidentiality
Threat to confidentiality
Disclosure of Information
Protects against unauthorized alteration of data
Integrity
Ensures that information is readily accessible to authorized users or
programs as the information is needed
Availability
Occurs when subjects not only maintain old access rights but gain new
ones as they move from one division to another within an organization.
Authorization Creep
is another non-discretionary access control model, related to RBAC. It is is based on the tasks each subject must
perform, such as writing prescriptions, or restoring data from a backup tape, or
opening a help desk ticket.
Task-based Access Control
Concentrates access control in one logical point for a system or organization.
Centralized Access Control
Local sites support and maintain
independent systems, access control databases, and data.
Decentralized Access Control
Is a 3rd party authentication system described in RFC 2865, 2866. Its uses UDP ports 1812 and 1813.
Remote Authentication Dial In User Service (RADIUS)
is RADIUS’ successor, designed to provide an improved (AAA) framework. RADIUS provides limited accountability, and has problems with flexibility, scalability, reliability, and security.
Diameter
What are the number of Attribute Value Pairs (AVP) of Radius and Diameter.
Radius = 8 Diameter = 32
The cornerstone concept of InfoSecurity
The CIA triad
Opposing forces to CIA
DAD - Disclosure, Alteration and destruction
True or false. Our mission as information security professionals is to balance the needs of CIA and make trade offs as needed
True
Is the unauthorised disclosure of information
Disclosure
Is the unauthorised modification of data
Alteration
Making systems in available
Destruction
—— is a claim of who you are
Identity
Proving an identity is called ——
Authentication
—— describes the actions you can perform on a system once you have identified and authenticated. Actions may include reading, writing, or executing files or programs
Authorisation
—– holds a user accountable of his actions. This is typically done by logging and analysing audit data
Accountability
It means a user cannot deny having performed a transaction. It combined authentication and integrity
Non repudiation