Domain 3 Flashcards

Access Control Concepts

1
Q

Audit

Domain 3

A

independent review/examination of records/activities to assess the adequacy of system controls, to ensure compliance with established policies & operational procedures

review & assessment by an independent party of all documentation & system controls. verifies if the system follows set standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CPTED

Domain 3

A

Architectural approach to the design of buildings & spaces which emphasizes passive features to reduce the likelihood of criminal activity

Crime Prevention through Environment Design

Style of architectural design that centers on purposefully guiding behavior with the specific goal of reducing potential crime. Aka “hostile architecture”. e.g. mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defense in Depth

Domain 3

A

Information security strategy integrating people, technology, & operations capabilities to establish variable barriers across multiple layers & missions of the organization

Cybersecurity concept of utilizing all of an organization’s resources to establish “multiple countermeasures in a layered or stepwise manner to achieve security objectives” NISTIR 8183

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC

Domain 3

A

Access control is left to discretion of the object’s owner/authorized entity to determine which rights entities can have

Discretionary Access Control

The owner (or anyone with equal levels of authorization) can use their own judgement to define the access rights each subject has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encrypt

Domain 3

A

protect private information by formatting the data into a form to only be read by those with permission

permission = those with the cipher to decrypt the information

disguising, obscuring, &/or converting classified information in a way that only permits authorized entities to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewalls

Domain 3

A

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules

Can be software-only or “dedicated hardware”-software hybrid

network security system that restricts/filters internet traffic by selectively blocking/allowing data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Insider Threat

A

authorized entity who can cause harm through destruction, disclosure, modification of data &/or denial of service

when something with authorized access uses that access to cause harm to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

iOS

A

operating system manufactured by Apple for mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layered Defense

A

multiple controls arranged to provide several consecutive controls to protect an asset. “Defense in Depth”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Linux

A

open source OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Log Anomaly

A

identified system irregularity in log entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logging

A

collecting/storing user activities in a log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logical Access Control Systems

A

automated system that controls an individual’s ability to access one+ computer system resources. Requires validation of individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC

A

Mandatory Access Control. Access control system implemented at a system administrator level where the system itself manages access controls within security policies that cannot be adjusted for discretionary reasons (e.g. Government classification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mantrap

A

entrance to a building where people must pass through two sets of doors, with only one set being able to open at a time (creating a “box” that can trap anyone in-between the doors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Object

A

passive information system-related entity that contains/receives information (devices, files, records, tables, processes, programs, domains). “Subject-Object” relationship.

17
Q

Physical Access Controls

A

controls implemented through a tangible mechanism (e.g. walls, fences, guards, locks, etc)

18
Q

Principle of Least Privilege

A

principle that user/programs should only have the minimum privileges necessary

19
Q

Privileged Account

A

IS account with approved authorizations of a privileged user

20
Q

Ransomware

A

malicious software that locks data/system from user until money is paid

21
Q

RBAC

A

Role-Based Access Control. User permissions is set by roles, based on job duties, which determine the scope of the user’s authorizations. Most efficient for high-rates of turnover while enforcing the concept of least privilege & reducing privilege creep

22
Q

Rule

A

instruction developed to allow/deny access to system by comparing validated identity to an access control list

23
Q

Segregation of Duties

A

ensuring organization processes cannot be completed by a single person. “Separation of Duties”

24
Q

Subject

A

individual, process, or device causing information to flow among objects/change to the system state

25
Technical Controls
security controls for IS primarily implemented through hardware, software, &/or firmware
26
Turnstile
one-way spinning door/barrier that only allows one person at a time
27
Unix
OS used in software development
28
User Provisioning
process of creating, maintaining, & deactivating user identities on a system