Section 1 Flashcards
What are some examples of detective access controls?
Security guards, supervising users, incident investigations, and intrusion detections systems
What are some examples of physical access controls?
Guards, fences, motion detectors, locked doors, sealed windows, lights, backups, cable protection, laptop locks, swipe cards, CCTV, mantraps, and alarms
What are the three commonly recognized authentication factors?
Something you know, something you have, and something you are
What is a cognitive password?
A series of questions about facts or predefined responses that only the subject should know (for example, what is your birthdate? What is your mother’s maiden name?)
Name at least eight biometric factors
Fingerprints, face scans, iris scan, retina scan, palm topography, palm geography, heart/pulse pattern, voice pattern, signature dynamics, keystroke patterns
What are the issues related to user acceptance of biometric enrollment and throughput rate?
Enrollment takes longer than 2 minutes are unacceptable; subjects will typically accept a throughput rate of about 6 seconds or faster
What access control technique employs security labels?
Mandatory access controls. Subjects are labeled as to their level of clearance. Objects are labeled as to their level of classification and sensitivity
The Bell-LaPadula, Biba, and Clark-Wilson access control models were all designed to protect a single aspect of security. Name the corresponding aspect for each model
Bell-LaPadula protects confidentiality
Biba protects integrity
Clark-Wilson protects Integrity
Name the three types of subjects and their roles in a security environment
The user accesses objects on a system to perform a work task
The owner is liable for protection of data
The data custodian is assigned to classify and protect data
Explain why the separation of duties and responsibilities is a common security practice
It prevents any single subject from being able to circumvent or disable security mechanisms
What is the principle of least privilege?
Subjects should only be granted only the amount of access to objects that is required to accomplish their assigned work tasks
Name the four key principles upon which access control relies
Identification, authentication, authorization, accountability
How are domains related to decentralized access control?
A domain is a realm of trust that shares a common security policy. The is a form of decentralized access control
Why is monitoring an important part of a security policy?
Monitoring is used to watch for security policy violations and to detect unauthorized or abnormal activities
What are the functions of an intrusion detection system (IDS)?
An IDS automates the inspection of audit logs and real-time system events, detects intrusion attempts, and watches for violations of confidentiality, integrity, and availability