Domain 5 Flashcards
First step to IT security
Baseline security plan
4 types of power failure
1) blackout
2) brownout
3) sags, spikes, surges
4) EMI (electromagnetic interference)
Fire suppression systems not safe for human life
-Halon systems
-Carbon dioxide
Can use:
-argonite
-FM-200 (preferred)
Mandatory access controls (MACs)
Logical access control filters used to validate access credentials that can’t be controlled/modified by normal users or data owners
Discretionary access controls (DACs)
Controls that may be configured or modified but the users or data owners
*DACs should be aligned with MACs to be effective
Kerberos
An authentication service that validates services and users in a DCE (distributed computing environment)
Denial of service (DoS)
Remote users may not be able to access data/apps vital to carry out day to day business
1st step in implementing logical access controls
Prepare an inventory of IS resources
Most effective control against identity theft
Two-factor authentication
Authentication (3)
-something you know (password)
-something you have (token card)
-something you are/do (biometric)
4 steps to implement logical access controls
1) inventory of IS resources
2) classify IS resources
3) perform grouping/labeling of IS resources
4) create access control list
Default deny access
Allows approved traffic and rejects all other traffic
Default allow access
Denies specific traffic and allows all other traffic
False rejection rate
(FRR or type-1error rate)
of times an individual w/ authority to use the system is falsely rejected by the system
Failure to enroll rate (FER)
Proportion of openly who fail to be enrolled successfully
False acceptance rate
(FAR or type-2 error rate)
of times an individual NOT granted authority to use the system is falsely accepted by the system
- best performance indicator
Cross error/equal error rate
(CER/EER)
Rate at which FAR and FRR are equal
-lowest is the most effective
-overall
Biometric attacks
Replay
Brute force
Cryptographic
Mimic
Replay (biometric attack)
Residual biometric characteristic is used by attacker to gain access (ex fingerprint left on device)
Brute force (biometric attack)
Sending numerous different biometric samples to a biometric device
Cryptographic (biometric attack)
Targets algorithm or encrypted data transmitted between biometric device and access control system
Mimic (biometric attack)
Attacker attempts to fake the biometric characteristics similar to those of the enrolled user
What has the highest reliability and lowest FAR
Retina/iris scan
Biometric life cycle
1) enrollment
2) transmission & storage
3) verification
4) identification/termination