Lesson 3 Flashcards

1
Q

access control basics (4)

A

allowing
denying
limiting
revoking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

most common permissions in ACLs (3)

A

read, write, execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

network ACLs regulate the activity of

A

IP addresses, MAC addresses, ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

attack that utilizes elevated permissions of software when the user has lower permissions

A

cross-site request forgery and clickjacking (confused deputy problem)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attack that misuses the authority of browser on the user’s computer. embeds a link into a web page or email that will direct the user to the link without their knowledge

A

CSRF (cross-site request forgery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attack that manipulates a web page and creates a ‘cover’ that users interact with, when they think they are interacting with the normal web page

A

clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

model of access control based on access being determined by the owner of the resource

A

discretionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

model of access control in which access is decided by a group of authority which may or may not include the owner of the resource

A

mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

model of access control based off allowing or denying based on a set of predetermined rules

A

rule-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

model of access control that functions on access controls set by a responsible authority, access is based on the role of the individual accessing the data

A

role-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

model of access control based on attributes of a particular person, resource, or environment

A

attribute-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

model that implements DAC and MAC, mainly concerned with confidentiality (no read up and no write down)

A

bell-lapadula model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

model concerned with integrity of data (no read down and no write up)

A

biba model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

model designed to prevent conflicts of interest (contains objects, company groups, conflict classes), focused on data integrity

A

brewer and nash model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly