ISC2 - Study Notes 5 Flashcards

1
Q

Another method is device fingerprinting that identifies devices based on several characteristics. Many of the following characteristics are easy to capture when a user attempts to connect to a network with a web page: operating system and version, IP addresses, browser, browser fonts, browser plug-ins, time zone, data storage, screen resolution, cookie settings, and HTTP headers.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user requesting a web page from a server is clearly a subject. Similarly, the web pages served by the web server are the objects. However, this web server is retrieving data from a back-end database (protected behind a firewall) to build the web page. When the web server retrieves the data, it is a subject and the database is the object.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Time, Remote Access Attribute, Location, Role or group membership

A

Subject Attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data (stored in files, folders, and shares)

Hardware (such as desktop computers, servers, and printers)

Applications (such as a web server application)

Networks (such as an Internet connection or an internal connection)

Facilities (controlled with physical security)

A

Access control systems can treat any of the following as objects :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Users

Computers

Applications

Networks

A

Access control systems can treat any of the following as subjects :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

??? (also called technical access controls) are implemented with technologies. Many logical access controls use access control lists (ACLs). For example, a router has an ACL with multiple rules that identify the traffic allowed in or out of a network. Similarly, files and folders often use ACLs to identify who can access the resource and what level of access each user has.

A

Logical Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

provides the most granular level of access control. It is an identity-based (or subject-based) model and allows data owners to assign permissions to subjects at the most basic level. For example, you can assign read permission to a single user. File systems such as New Technology File System (NTFS, used by Microsoft) and Network File System (NFS, used on UNIX-based systems such as Solaris and Linux) use the DAC model.

A

DAC Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

security administrators control the access granted to users. Other ??? models include role-based, rule-based, and attribute-based models.

A

non-Discretionary Access Control (non-DAC) models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Some operating systems implement non-DAC models for system file access. This prevents malware from taking ownership of any critical or sensitive system files or modifying permissions on any of these files. Users still own and manage their own files using DAC, but the non-DAC model methods protect system files. In other cases, the operating system uses a non-DAC model exclusively, such as Mandatory Access Control.

A

non-DAC model info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

uses roles or groups to determine access. Subjects are placed into specific roles and object permissions are granted to the roles. Although the Role-BAC model doesn’t provide the granularity offered by DAC, it is easier to implement for large groups of people. ??? reduce the administrative workload and are very useful in organizations with high employee turnover.

A

The Role-based Access Control (Role-BAC or RBAC) model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly