Exam 2 Flashcards
Access Control Approaches Rely on The Following Four Mechanisms
- Identification- I am a user of the system
- Authentication- I can prove I’m a user of the system
- Authorization- Here’s what I can do with the system
- Accountability- You can track and monitor my use on the system
Roles of the Communities of Interest
Evaluation of current and proposed risk controls
Determining which options are cost effective
Installing the needed controls
Ensuring that the controls stay effective
Three commonly used authentication factors
- Something you know
Relies on what the unverified user knows. Like password. - Something You Have
Relies on that an unverified user has and can produce when necessary. Like ID cards - Something That You Are or Can Produce
Relies on individual characteristics. Like fingerprints
MAC layer firewall
Designed to operate at the media access control sublayer at layer 2 of the network
Application layer proxy firewall
capable of functioning as both a firewall and an application layer proxy server
Packet-filtering firewall
Examines header information of data packets that enter a network.
Firewall
Combination of hardware/software that filters information moving between the inside/outside of a network
Encapsulation
The native protocol of the client is embedded within the frames of a protocol
Encryption
Keeps data private as it travels over the public network
Authentication
Ensures the identification of the remote user
Transport Mode
Data within an IP packet is encrypted, but the header information is not
Tunnel Mode
Establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network
Proxy server
server that exists to intercept requests for information from external users to minimizing demand on internal servers
Reverse proxy
retrieves internal information to provide to requesting outside users
Clark-Wilson Integrity Model change control principles
- No changes by unauthorized users
- No unauthorized changes by authorized users
- Maintain internal and external consistency
IDPS Response Techniques
Terminating the user session or network connection
Blocking access to the target system or systems
Blocking all access to the targeted information asset
Reasons for an IDPS
Intrusion detection
Documentation- Logs data
Attack deterrence
Host based IDPS
Resides on a particular device and only monitors that system
Network based IDPS
Resides on a device connected to a segment of an organizations network and only monitors that segment