Domain 1 - Access Controls Flashcards

1
Q

Three constructs someone implementing an AC system should consider.

A

AC Policies, Models, and Mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DAC

A

DISCRETIONARY ACCESS CONTROL

Allows the creator of a file to delegate access to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attributes of a subject are referred to as…?

A

privilege attributes or sensitives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Total number of permissions in a Windows OS uses the NTFS file system?

A

14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Number of Standard Permissions in a Windows OS NTFS File System?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

Process where requests to access a particular resource should be granted or declined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication

A

Providing and validating identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Capability List

A

DAC matrix that sorts by rows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RSBAC

A

RULES SET BASED ACCESS CONTROLS

Discretionary controls giving data owners the discretion to determine the rules necessary to faciliate access.

Open Source Framework logic for GFAC by Abrams and LaPadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CUI

A

CONSTRAINED USER INTERFACE

Methodology that restricts the user’s actions to specific functions by not allowing them to request functions that are outside of their respective level of privilege or role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 Main Types of CUI

A
  1. Menus and Shells
  2. Database Views
  3. Physically Constraining a UI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Menus and Shells

A

Users are given the commands they can execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Database Views

A

Mechanism used to restrict user access to data contained in databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physically Constraining a UI

A

Provides only certain keys on a keypad or a certain touch button on a screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VBAC

A

VIEW-BASED ACCESS CONTROL

Restricts or limits and AC subject’s ability to view or perhaps act on an object on the AC subject’s assigned level of authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CDAC

A

CONTENT-DEPENDENT ACCESS CONTROL

Protects databases containing sensitive information. Permits or denies the subjects access to objects based on explicit content within the object.

ex. HIV test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CBAC

A

CONTEXT-BASED ACCESS CONTROL

Used in FW applications to extend the FW’s decision making process. ex. Stateful Inspection FW.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CDAC vs CBAC

A

CDAC - Makes decisions based on the content within an object

CBAC - Only concerned with context or the sequence of events leading to the object being allowed through the FW.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TRBAC

A

TEMPORAL ROLE-BASED ACCESS CONTROL

Support periodic role enabling and disabling and temporal dependencies among such actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NDAC

A

NON-DISCRETIONARY ACCESS CONTROL

Policies that have rules that are not established at the discretion of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MAC

A

MANDATORY ACCESS CONTROL

Used in environments of high levels of security. Decisions are made by a single entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MAC’s 3 Object Level Classifications

A

Top Secret
Secret
Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

*-property

A

Star Property BLP

A subject can save an object only at the same or higher classification. BIBA - A subject cannot modify an object of a higher integrity level (No write up)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Strict *-property

A

Strict Star Property Requires information can be written at, but not above, the subject’s clearance level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

2 Models that use MAC?

A

Bell-LaPaula Confidentitiaity

Biba Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

ABAC

A

ATTRIBUTE-BASED ACCESS CONTROL

Access control method where subject requests to perform operations on objects are granted or denied based on assigned attributes of the subject, assigned attributes of the object, environment conditions, and a set of policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Separation of Duties is a key element in which Model?

A

Clark-Wilson formal model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Bell-LaPadula Model Components

A

Components are: Subjects, Objects and an AC Matrix.

Objects are classified into a hierarchy of security levels based on sensitivity (low to high)

Subjects assigned security levels called ‘Clearance Levels’.

AC Matrix - Relation between the sensitivity levels of Objects and Subjects. Defines permissions for each clearance level and object classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bell-LaPadula Model Tenet

A

A given subject can read objects at the same or lower sensitivity level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Simple Security Property

A

When a subject can read objects at the same or lower sensitivity level, but not higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Limitations of the Bell-LaPadula Model?

A
  1. Concerned only with confidentiality and makes no mention of other properties
  2. Does not address important goals such as ‘need to know’ or the ability to restrict access to individual objects based on a subject’s need to access them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which model was designed for controlling access to sensitive data in government and military applications?

A

Bell-LaPadula Confidentiality Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Biba Model

A

Lattice Based.

Integrity model focusing on ensuring that the integrity of information is being maintained by preventing corruption.

Core is a multilevel approach to integrity designed to prevent unauthorized subjects from modifying objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Biba Model - How is Access Controlled?

A

To Ensure that objects maintain their current state of integrity as subjects interact with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Biba Model - How it assigns Integrity?

A

Assigns levels to subjects and objects depending on how trustworthy they are considered to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ss-property

A

BLP - A subject cannot read/access an object of higher classification (No read up).

BIBA - A Subject cannot observe an object of a lower integrity level (no read down)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Invocation Property

A

BLP - Not used.

BIBA - A subject cannot send logical service requests to an object of a higher integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Clark-Wilson Components

A

Authenticated Principals (Users)
Programs Acting on Data (Transaction Processes)
Data Items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Clark-Wilson Integrity Policy

A

Well-formed transactions (that maintain a consistent level of integrity between initial and end state. Also instills the Separation of Duties principals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

MLS Systems

A

Multilevel Security Systems Systems in which information with various sensitivities or integrity requirements can be processed concurrently in a single system by users or actors with multiple levels of clearance or need to know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Brewer-Nash Model

A

‘Chinese Wall’ Principal is that users should not access the confidential information of both a client organization and one or more of it’s competitors.

Rare because the access control rules change based on subject behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Graham-Denning Model

A

Concerned with how subjects and objects are created, how subjects are assigned rights or privileges, and how ownership of objects is managed. *Primarily concerned with how a model system controls subjects and objects at a very basic level where other models simply assumed such control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Graham-Denning Model 3 Parts

A
  1. Set of Objects
  2. Set of Subjects
  3. Set of Rights
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Graham-Denning Subjects

A

Two Parts:

  1. Process
  2. Domain - Set of constraints controlling how subjects may access objects.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Graham-Denning Model Eight Primitive Protection Rights

A

Also called Commands that subjects can execute to have an effect on other subjects or objects.

  1. Create Object
  2. Create Subject
  3. Delete Object
  4. Delete Subject
  5. Read Access Right
  6. Grant Access Right
  7. Delete Access Right
  8. Transfer Access Right
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Harrison-Ruzzo-Ullman Model

A

Very similar to Graham-Denning.

Composed of a set of generic rights and a finite set of commands. Also concerned with Situations in which a subject should be restricted from gaining particular privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Process Flow involved in the implementation of authentication mechanisms are?

A
  1. Identify - Process used to allow the access control subject to provide information as to their identity.
  2. Authenticate - Set of providing and validating identity within the access control system.
  3. Authorize - Process where requests to access a particular resource should be granted or denied based on outcome of the authentication process.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

3 Most Common Methods Used to Provide User Identity in an AC System

A
  1. User ID - Username and Password
  2. PIN - Typically a 4 digit numerical combination created by the user.
  3. Account Number - Typically an 8-16 unique numerical sequence assigned to an individual.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Automated Provisioning

A

Solutions that provide a framework for managing AC Policies by role, interconnection with IT systems, workflows to sign-off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

3 Common Factors in Authentication

A
  1. Something you know
  2. Something you have
  3. Something you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

ISO 7816

A

Standard for landing contact readers (Smart Cards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Dynamic Passwords

A

One time passwords. Could be from a token or hard word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

2 Types of Tokens

A
  1. Synchronous - Time is synchronized between the token device and the authentication server. (RSA Token)
  2. Asynchronous - Provides a new, one-time password with each use of the token. (SafeWord eToken PASS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Process for Asynchronous Subject to gain access to object

A

5 Step Process.

  1. Authentication server presents a challenge request to subject
  2. Subject enters the challenge into token device
  3. Token calculates a correct response
  4. Subject enters response to the challenge along with a password or PIN
  5. Response & Password (or PIN) is verified by the authentication server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

RFID

A

Radio Frequency Identification

Wireless, non-contact use of radio electromagnetic fields to transfer data for the purposes of automatically identifying and tracking tags attached to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Main Issue with RFID

A

Crossing Signals. When two or more readers overlap, the tag is unable to respond to simultaneous queries.

57
Q

Anti-Collision Protocol

A

Enable RFID tags to take turns in transmitting to a reader.

58
Q

Biometrics

A

Technology that measure and analyze human body characteristics (DNA, fingerprints, voice patterns, facial pattern, hand movements)

59
Q

Key Issue with Biometrics

A

Since Biometric data cannot be changed, data such as a user’s facial characteristics and fingerprints are in the public domain and can be captured without consent or knowledge.

Solution? Protocols should be in place to rely on proof of freshness of biometric data and cannot rely on its secrecy.

60
Q

Two steps in Biometric Authentication Solution

A
  1. Enrollment

2. Verification

61
Q

On-Card Matching vs Off-Card Matching?

A

Think in terms of Biometrics

  1. On-Card Matching: User verification carried out via smart card
  2. Off-Card Matching: User verification carried out via the system.
62
Q

How many classifications within Biometrics?

A

Two

  1. Behavioral
  2. Physiological
63
Q

Behavior Biometrics

A

signature analysis, voice pattern recognition, and keystroke dynamics

64
Q

Signature Analysis

A

3D analysis of a signature, using both the pressure and form of the signature.

Also analyzes the series of movements such as acceleration, rhythm, pressure, and flow.

65
Q

Voice Pattern Recognition

A

Creates a database of unique characteristics of the AC Subject’s voice.

Subject speaks into a microphone and an AC device compares the current voice pattern with the one in the database.

  • Inexpensive Methodology to implement, but because of high error rate, it is best if used to complement another more accurate technology (Iris Scanning)
66
Q

Issues with Voice Pattern Recognition?

A

-> Biology. As the subject ages, the characteristics of the voice naturally change. Same is true is subject is under stress (during an emergency)

-> Inflection - Possible through
altering of inflection during given phrase.

67
Q

Keystroke Dynamics

A

AC Subject’s Keystrokes as in the Username and Password. Characteristics include but aren’t limited to: - Length of time each key is held down

Length of time between keystrokes

Typing Speed

Tendencies to switch between a numeric keypad and keyboard numbers

Keystroke tendencies involved in capitalization *Lowest cost authentication mechanism. Cannot be used reliably in a single-factor or two-factor (using passphrase). Needs to be used with two-factor (Iris Scanning)
**Provides continuous authentication

68
Q

Issues with Keystroke Dynamics?

A

Accuracy can be affected by hand injuries, fatigue, arthritis, and even temperature

69
Q

Physiological Biometrics Examples

A

Fingerprint, Hand, Vascular, Eye, Facial Recognition Technology

70
Q

Fingerprint Verification Technology

A

Typically requires 7 characteristics or matching points. Human finger contains some 30-40 characteristics or matching points.

71
Q

Issue with Biometric Technology and Possible Solution?

A

Biggest Challenge facing biometric technology, and fingerprint verification in particular, is the ability to carry out performance evaluations unambiguously and reliable.

Solution FVC-onGoing, a web based automated evaluation system for fingerprint recognition algorithms.

72
Q

FVC-onGoing

A

Web-Based evaluation system, used mainly for fingerprint recognition algorithms. Test are carried out on a set of sequestered datasets, and results are reported online by using well-known performance indicators and metrics.

FVC = Fingerprint Verification Competitions

73
Q

Hand Geometry Technology

A

Verification based on key points in Subject’s hand. Hand Geometry measures dimensions on hands and fingers.

Pros - Provides a proven reliable verification even with difficult environments, simple to operate

Cons - Less accurate and requires large and expensive equipment.

74
Q

Vascular Patterns

A

‘Ultimate Palm Reader’

A picture of the veins in a person’s hand or finger, including, thickness and location, which are determined to be unique for each Subject.

75
Q

Claims for Vascular Pattern Technology

A
  1. Difficult to Forge - Veins are inside hand, and veins are only registered is blood is flowing through them.
  2. Contactless
  3. Many and Varied Users - Used for ATMs, hospitals, and Universities in Japan.
  4. Capable of 1:1 and 1:many matches
76
Q

Retina Scan

A

Oldest and most accurate biometric authentication methodologies. There is no known technology that can forge a retina scan. And retina scans on a dead subject will not create the same signature as that of a live one.

77
Q

Iris Scan

A

Based on scanning the granulatrity of the richly detailed color bands around the pupil. Bands are well defined at birth and change litte over the subject’s lifetime. Maps nearly 247 variables.

78
Q

Iris Scan vs Retina Scan

A

Iris Scan maps the color bands on the Iris

Retina Scan - Maps the blood vessels in the back of the eye.

79
Q

Issues with Iris Scanning

A
  1. Has proven to fall victim to scanned images

2. Alcohol New ISO standard requires two images to be compared with an Iris scan.

80
Q

Facial Recognition

A

Uses landmarks on the face, such as cheekbone, tip of nose, and eye socket orientation.

Approx 80 separate characteristics, but systems usually measure 14-22.

81
Q

Rates used in Biometric Accuracy

A

FAR & FRR

82
Q

FRR

A

FALSE REJECTION RATE

Failure to recognize a legitimate user.

Type 1 Error

83
Q

FAR

A

FALSE ACCEPTANCE RATE

Erroneous Recognition.

Type 2 Error

84
Q

In terms of FAR and FRR, what will adjusting the threshold do?

A

Adjust the failure rates. However, decreasing one will increase the other.

85
Q

CER

A

CROSSOVER ERROR RATE

The point where the accuracy rate equals the error rate of the other.

86
Q

Crossover Accuracy: Retinal Scan

A

1:100,000,000

87
Q

Crossover Accuracy: Iris Scan

A

1:131,000

88
Q

Crossover Accuracy: Fingerprint

A

1:500

89
Q

Crossover Accuracy: Hand Geometry

A

1:500

90
Q

Crossover Accuracy: Signature Dynamics

A

1:50

91
Q

Crossover Accuracy: Voice Dynamics

A

1:50

92
Q

ANSI INCITS 395-2005

A

Specifies a format for the representation of a digitized sign or signature data.

93
Q

How many types of Tokens are there?

A

Four

  1. Static Password
  2. Synchronous Dynamic Password
  3. Asynchronous Password
  4. Challenge Response
94
Q

Static Password Token

A

Device contains a password that is physically hidden (not visible to processor) but that is transmitted for each authentication. Vulnerable to replay attacks

95
Q

Synchronous Dynamic Password Token

A

A timer is used to rotate through various combinations produced by a cryptographic algorithm. Token and authentication server MUST have synchronized clocks.

96
Q

Asynchronous Password Token

A

A one-time password is generated without the use of a clock.

97
Q

Challenge Response Token

A

Using public key cryptography, it is possible to prove possession of a private key without revealing that key.

The Authentication server encrypts a challenge with a public key; the device proves it possesses a copy of the matching private key by providing the decrypted challenge.

98
Q

Smart Cards (Types?)

A

Typically a type of chip card.

Fobs, SIMS used in GSM mobile phones, USB-based tokens are forms of these.

Two types: Contact and Contactless

Contact must be inserted into a reader.
Contactless only requires proximity.

99
Q

Dual-Interface Cards vs Hybrid Cards

A

Two less known types of Smart Cards Dual-Interface

Single Chip with both contact and non-contact interfaces. Possible to access the same chip using either interface with a high level of security.

Hybrid - Has two chips, one with a contact interface, another with a contactless interface.

100
Q

Common Techniques for authentication in your AC System

A
  1. Knowledge based
  2. Token based
  3. Characteristic based
101
Q

Dual Control

A

aka ‘Split Knowledge’

Built on the principal that ONE person should have access to information that would allow the person to determine the encryption key used to encrypt protected information more quickly than a brute-force attack.

Collusion would require two people.

102
Q

Periodic Authentication After authentication

A

Periodically issues the challenge/response authentication queries with the user’s token to determine if the user has physically left the area. Reduces risk that a user would walk away from a device before plugging out.

103
Q

Reverse Authentication

A

“Way to authenticate the website/page to the user. BoA adopted this early using PassMark. Example: ““Chose the pictures with the cars in it”””

104
Q

Reference Monitor

A

The service or program where AC information is stored and where access control decisions are made. Once granted, what a user can do is controlled by the authorization matrix/table.

105
Q

Authorization Table

A

Matrix of AC objects, subjects, and their respective rights. Used in some DAC systems to provide a simple and intuitive UI for the definition of AC rules.

106
Q

LDAP

A

Lightweight Directory Access Protocol Application protocol used for querying and modifying directory services over TCP/IP.

107
Q

LDAP Directory

A

Lightweight Directory Access Protocol Directory Is a logically and heirarchically organized gropu of objects and their respective attributes using LDAP Directory Tree.

108
Q

LDAP Tree

A

Lightweight Directory Access Protocol [Directory] Tree Starts with the domain names at the top of the hierarchy followed by organizational boundaries, then groups followed by users and data, such as groups of documents.

109
Q

DN

A

Distinguished Name

Part of the Directory Entry Formed by combining it’s Relative Distinguished Name (RDN), one or more attributes of the entity itself, and the RDN of the superior entries reaching all the way up tot eh root of the DIT.

110
Q

ADDS

A

(NT Directory Services)

Micrsoft Active Directory Domain Services

Stores data and information within a central database. Provides things like LDAP, authentication, DNS based naming. Used for assignment of policies because of its many attributes, it is commonly used by separate services to facilitate software distribution with a network.

111
Q

SSO

A

Single Sign On Primary Purpose is convenience of the user.

112
Q

What are the two Significant risks with SSO?

A
  1. Single point of failure

2. Single point of access

113
Q

Kerberos

A

Developed at MIT Popular network authentication protocol for indirect (3rd party) authentication services. Provides strong authentication using secret-key cryptography.

114
Q

Kerberos Operations

A

It is an operational implementation of key distribution technology and affords a key distribution center, authentication service, and ticket granting service. Hosts, applications, and servers all have to be ‘kerberized’ to be able to communicate with the user and the ticket granting services

115
Q

Kerberos Supports?

A
  1. Authentication
  2. Authorization
  3. Confidentiality
  4. Integrity
  5. Nonrepudiation
116
Q

Nonrepudiation

A

Determines exactly who sent or received a message.

117
Q

Kerberos Port Number(s)

A

UDP: 53/88

TCP: 53/88

118
Q

Four types of trust architectures

A
  1. Internet
  2. Intranet
  3. extranet
  4. DMZ
119
Q

DMZ

A

Demilitarized Zone Computer host or small network inserted in a ‘neutral zone’ between a companies private network and the outside public network. Prevents outside threats from having direct access to company data.

120
Q

Intranet vs Extranet

A

Intranet - Network based on TCP/IP and belonging to an organization, accessible only by the organization’s members, employees, or other with authorization. Extranet - Network that allows controlled access from outside for specific business or educational purposes.

121
Q

Trust Path

A

Series of trust relationships that authentication requests must follow between domains.

122
Q

One-Way Trust

A

Unidirectional authentication path that is created between two domains. A trust B, so A can get to B, but B cannot get to A

123
Q

Two-Way Trust

A

Authentication requests between two domains in both directions. A trust B, and B trust A.

124
Q

Trust Transitivity (And Types)

A

Determines whether a trust can be extended outside the two domains between which the trust was formed.

Transitive Trust - Extend Trust Relationship

Non-Transitive Trust - Deny Trust Relationships with other domains.

125
Q

Name areas that make up the Identity Management Lifecycle

A
  1. Authorization - Determines whether a user is permiteed to access desired resource.
  2. Proofing - Verify’s peoples identity before enterprise issues them accounts and credentials.
  3. Provisioning - Automation of all procedures and tools to manage the lifecycle of an identity.
  4. Maintenance - User management, password management, role/group management
  5. Entitlement - Set of rules, defined by resource owner, for managing access to a resource, and for what purpose.
126
Q

GFAC

A

Generalized Framework AC by Adams and LaPadula RSBAC is based on this.

127
Q

iSCSI

A

Internet Small Computer Systems Interface Transport Layer Protocol that works on top of TCP.

128
Q

What are the Authentication methods supported with iSCSI

A

Kerberos
SRP
SPKM1/2
CHAP

129
Q

SRP

A

SECURE REMOTE PASSWORD

Secure password-based authentication and key-exchange protocol.

130
Q

SPKM1/2

A

Simple Public-Key Mechanism Provides authentication, key establishment, data integrity, and dta confidentiality in an online distributed application enviroment using a public-key infastructure.

131
Q

CHAP

A

Challenge Handshake Authentication Protocol Used to periodically verify the identity of the peer using a three-way handshake.

132
Q

Biba Formal Model - 3 Primary Rules

A
  1. AC Subject cannot request services from an AC Object that has a higher integrity level
  2. AC Subject cannot modify an AC Object that has a higher integrity level
  3. AC Subject cannot access an AC Object that has a lower integrity level
133
Q

Singulation Protocol

A

Anti-collision protocols for RFID tags to take turns in transmitting to a reader.

134
Q

Behavior traits in a biometric device

A

Voice pattern
Keystroke dynamics
Signature dynamics

135
Q

type 1 error

A

FRR - Fales Reject Rate

136
Q

type 2 error

A

FAR - False Acceptance Rate

137
Q

Voice Pattern vs Speech Recognition

A

VP - Identifies and Records a number of Data Points based on patterns.

SR - Identifies Word sounds and matches the sounds to a prerecorded profile.

138
Q

IAM Programs?

A

Control Physical and logical access to information, systems, devices, and facilities.