Domain 5 Flashcards
First step to IT security
Baseline security plan
4 types of power failure
1) blackout
2) brownout
3) sags, spikes, surges
4) EMI (electromagnetic interference)
Fire suppression systems not safe for human life
-Halon systems
-Carbon dioxide
Can use:
-argonite
-FM-200 (preferred)
Mandatory access controls (MACs)
Logical access control filters used to validate access credentials that can’t be controlled/modified by normal users or data owners
Discretionary access controls (DACs)
Controls that may be configured or modified but the users or data owners
*DACs should be aligned with MACs to be effective
Kerberos
An authentication service that validates services and users in a DCE (distributed computing environment)
Denial of service (DoS)
Remote users may not be able to access data/apps vital to carry out day to day business
1st step in implementing logical access controls
Prepare an inventory of IS resources
Most effective control against identity theft
Two-factor authentication
Authentication (3)
-something you know (password)
-something you have (token card)
-something you are/do (biometric)
4 steps to implement logical access controls
1) inventory of IS resources
2) classify IS resources
3) perform grouping/labeling of IS resources
4) create access control list
Default deny access
Allows approved traffic and rejects all other traffic
Default allow access
Denies specific traffic and allows all other traffic
False rejection rate
(FRR or type-1error rate)
of times an individual w/ authority to use the system is falsely rejected by the system
Failure to enroll rate (FER)
Proportion of openly who fail to be enrolled successfully
False acceptance rate
(FAR or type-2 error rate)
of times an individual NOT granted authority to use the system is falsely accepted by the system
- best performance indicator
Cross error/equal error rate
(CER/EER)
Rate at which FAR and FRR are equal
-lowest is the most effective
-overall
Biometric attacks
Replay
Brute force
Cryptographic
Mimic
Replay (biometric attack)
Residual biometric characteristic is used by attacker to gain access (ex fingerprint left on device)
Brute force (biometric attack)
Sending numerous different biometric samples to a biometric device
Cryptographic (biometric attack)
Targets algorithm or encrypted data transmitted between biometric device and access control system
Mimic (biometric attack)
Attacker attempts to fake the biometric characteristics similar to those of the enrolled user
What has the highest reliability and lowest FAR
Retina/iris scan
Biometric life cycle
1) enrollment
2) transmission & storage
3) verification
4) identification/termination
Dedicated circuit
Symmetric telecommunication line connecting 2 locations
Switched circuit
Does not permanently connect 2 locations, be set up on demand:
Circuit switching (telephone network)
Packet switching (lower cost)
7 layers to OSI architecture
- Physical (Please)
- Data link layer (Do)
- Network layer (Not)
- Transport layer (Teach)
- Session layer (Stupid)
- Presentation layer (People)
- Application layer (Anything)
- Physical layer
Relates to electrical signal or hardware devices
- Data link layer
Relates to MAC address or bit conversion
- Network layer
Relates to routing or IP address
- Transport layer
Related to
-reliable delivery
-connection oriented
-delivery in proper order
-congestion control
- Session layer
Relates to managing connection
- Presentation layer
Converts data into presentable format
- Application layer
Relates to end users
LAN components
- Hub & repeater (dumb device)
- Switch & bridge (more capable)
- Router (most capable - layer 3)
Layer-2-switches
Devices that can divide and interconnect network segments & help to reduce collision in domains in Ethernet based networks
Fiber optics
Most secure mode of data transmission