Domain 5 Flashcards
Access Control
The objective of access control is to protect information and informaation systems from unauthorized access (confidentiality), modification (integrity), and disruption (availability).
Physical access focuses and facility, equipment and devices.
Access management
Access management controls are security mechanisms that control how subjects and objects communicate and interact with each other and flow of information.
Subject
A subject is an active entity that requests access to an object or to the data within the object.
Object
An object is an entity being accessed or the item being acted upon.
Rights
Rights generally refer to the ability of a subject to take an action; for example, the right to log on remoely, install software, and create user accounts. Rights can be assigned to user accounts, group, accounts, or resources.
Permissions
Permissions are functions that a subject can perform on an object, a file or folder; for example, read, write, modify, and delete.
- Access control lists are generally used to assign permissions.
- Permissions can be assigned to a user account, group accounts, or resources depending upon the system or device.
- Permissions are generally cumulative.
- Permissions can be explicit ot inherited.
Privilege
Privilege relates to overriding capabilities.
- Administrative, root, and super user.
- Privilege trumps rights and permissions.
Need to know
Need to know means that the subject has a demonstrated and approved reason for being graned access.
Least Privilege
Least Privilege means assigning subjects only the rights and permissions needed to complete their assignments.
Default Allow
Default Allow means any access or action not explicitly forbidden is allowed.
Default Deny
Default Deny means any access or action not explicitly allowed is forbidden.
Authorization Creep
Authorization Creep is the accumulation of access rights, permissions, and priviledges over time.
- Promotions, lateral moves, cross-training and temporary coverage may contribute to authorization creep.
Dual Control
Dual Control is the practive of having more than one subject or key required to complete a specific task (requestor and approver).
Separation of duties
Separation of duties is the breaking down of a task into processes that are assigned to different subjects so that no one subject is in complete control.
Registration
Registration is a distinguishing characteristic (e.g. username)
Authentication
Authentication is the process of providing an identify to an authentication system.
- The proof is referred to as a factor.
- The combination of a user name and factor is referred to as credentials.
Authentication Factors
- Something a user knows.
- Something a user has.
- Something a user is / something a user does.
- Something a user is.
Something you know
Something you know is a shared secret known to the user and the authentication system.
- Passwords, passphrases, Cognitive passwords, out-of-wallet password.
Cognitive Passwords
Cognitive Passwords (challange questions) utilize a preselected questions and answer based on fact, opinion, or memory.
Out-of-Wallet passwords
Out-of-Wallet passwords (challange questions) are answers to questions derived from subscription databases.
Something you have
Something you have requires physical possetion of a device.
- Secure token, Smart Card.
Secure Token
A secure token is a handheld device with a LED that displays a number and the number is synchronized with an authentication server.
Smart Cards
A smart card is a credit card-sized card that has an integrated circuit and a certifiacte used to identify the holder.
Types of Smart Cards
- Smart Card
- Common Access Card (CAC)
- Personal Identity Verification (PIV)
- Contactless Card
- Proximity Card
Common Access Card (CAC)
Smart card that includes a picture of the user. Used for both visual identification and computer access.
Personal Identify Verification (PIV)
Smart card that includes picture of the user. Used for both visual identification and computer access.