Domain 5 - Identity and Access Management Flashcards
These access controls include policies or procedures to implement and enforce overall access control.
Administrative
These access controls include hardware or software mechanisms used to manage access to resources and systems and provide protection for those resources and systems.
Logical/technical
These access controls include physical barriers deployed to prevent direct contact and access with systems or areas within a facility.
Physical
What are the 3 authentication factors?
something you know (such as a password or PIN), something you have (such as a smartcard or token), and something you are (based on biometrics).
What identifies the accuracy of a biometric method
the crossover rate
a mechanism that allows subjects to authenticate once on a system and access multiple objects without authenticating again.
Single sign-on (SSO)
An active entity that accesses a passive object to receive information from, or data about, an object. They can be users, programs, processes, computers, or anything else that can access a resource.
Subjects
A passive entity that provides information to active subjects. Some examples include files, databases, computers, programs, processes, printers, and storage media.
objects
An access control is any hardware, software, or administrative policy or procedure that controls access to resources. The goal is to provide access to authorized subjects and prevent unauthorized access attempts. Name the 3 primary control types.
preventive, detective, and corrective.
This access control attempts to thwart or stop unwanted or unauthorized activity from occurring. Examples of these access controls include fences, locks, biometrics, mantraps, lighting, alarm systems, separation of duties policies, job rotation policies, data classification, penetration testing, access control methods, encryption, auditing, the presence of security cameras or closed circuit television (CCTV),
smartcards, callback procedures, security policies, security awareness training, antivirus software, firewalls, and intrusion prevention systems.
preventive control
There are 7 access controls: 3 main ones and 4 others. What are the four other types of access controls?
deterrent, recovery, directive, and compensation access controls.
This access control attempts to discover or detect unwanted or unauthorized activity. These controls operate after the fact and can discover the activity
only after it has occurred. Examples include security guards, motion detectors, recording and reviewing of events captured by security cameras or CCTV, job rotation policies, mandatory vacation policies, audit trails, honeypots or honeynets, intrusion detection
systems, violation reports, supervision and reviews of users, and incident investigations.
A detective control
This access control modifies the environment to return
systems to normal after an unwanted or unauthorized activity has occurred. They attempt to correct any problems that occurred as a result of a security incident. They can be simple, such as terminating malicious activity or rebooting a system. They also include antivirus solutions that can remove or quarantine a virus, backup and restore plans to ensure that lost data can be restored, and active intrusion detection systems that can modify the environment to stop an attack in progress.
A corrective control
This access control attempts to discourage security policy violations. They are similar to preventive controls but these often depend on individuals deciding not to take an unwanted action. In contrast, a preventive control actually blocks the action. Some examples include policies, security awareness training, locks, fences, security badges, guards, mantraps, and security cameras.
A deterrent control
This access control attempts l to repair or restore resources, functions, and capabilities after a security policy violation. They are an extension of corrective controls but have more advanced or complex abilities. Examples include backups and restores, fault-tolerant drive systems, system imaging, server clustering, antivirus software, and database or virtual machine shadowing.
A recovery control
This access control attempts to direct, confine, or control the actions of subjects to force or encourage compliance with security policies. Examples include security policy requirements or criteria, posted notifications, escape route exit signs, monitoring, supervision, and procedures.
A directive control
This access control provides an alternative when it
isn’t possible to use a primary control, or when necessary to increase the effectiveness of a primary control. As an example, a security policy might dictate the use of smartcards by all employees but it takes a long time for new employees to get a smartcard. The organization could issue hardware tokens to employees as a compensating control. These tokens provide stronger authentication than just a username and password.
A compensation control
the process of a subject claiming, or professing, an identity.
Identification
This verifies the identity of the subject by comparing one or more factors against a database of valid identities, such as user accounts.
Authentication
Subjects are granted access to objects based on proven identities. For example, administrators grant users access to files based on the user’s proven identity.
Authorization
Users and other subjects can be held accountable for their actions when auditing is implemented. Auditing tracks subjects and records when they access objects, creating an audit trail in one or more audit logs. For example, auditing can record when a user reads, modifies, or deletes a file. Auditing provides this.
Accountability
What is Type 1 authentication factor
something you know
What is Type 2 authentication factor
something you have
What is Type 3 authentication factor
something you are or something you do
A series of questions about facts or predefined responses that only the subject should know.
cognitive password
Hardware tokens that are time-based and synchronized with an authentication server
Synchronous Dynamic Password Tokens
Hardware token that generates passwords based on an algorithm and an incrementing counter.
Asynchronous Dynamic Password Tokens
In biometrics this error occurs when a valid subject is not authenticated. This is also known as a false negative authentication.
A Type 1 error
In biometrics this occurs when an invalid subject is authenticated. This is also known as a false positive authentication.
A Type 2 error
The ratio of Type 1 errors to valid authentications is known as
false rejection rate (FRR)
The ratio of Type 2 errors to valid authentications is called
false acceptance rate (FAR)
centralized access control technique that allows a subject to be authenticated only once on a system and to access multiple resources without authenticating
again.
Single sign-on (SSO)
Ticket authentication is a mechanism that employs a third-party entity to prove identification and provide authentication. The most common and well-known ticket system is
Kerberos