Secure Software Design - Access Control Flashcards
What are the two core principles of access control?
Record everything and detect and deal with intrusions.
List the four main types of credentials used in access control.
Knowledge-based (passwords), Possession-based (key or card), Biometric (fingerprints), Social Access (authorization by a known person).
Fill in the blank: The principle of granting only necessary access is called the ______.
Principle of least privilege.
Why is session management important in access control?
It prevents unauthorized access by managing and protecting session IDs, ensuring they are not exposed or reused.
What is broken access control?
A vulnerability where permission checks are insufficient, allowing unauthorized access to restricted resources.
Name two common vulnerabilities in access control.
Broken access control and bad session management.
Fill in the blank: Insecure session management can lead to the theft of ______.
Credentials.
What is a direct way to prevent access control vulnerabilities?
Verify all references to data and functions with appropriate access control checks.
What is the purpose of multi-factor authentication (MFA)?
To strengthen security by requiring multiple pieces of evidence for user verification.
List the three types of multi-factor authentication (MFA) factors.
Something you know, something you have, something you are.
What is a security token?
A device or software that verifies ‘something you have,’ unique to the user for authentication purposes.
Explain the difference between paper, software, and hardware tokens.
Paper tokens are one-time passwords; software tokens are installed on devices; hardware tokens are physical devices for secure access.
What is a drawback of software tokens?
They can be copied if the device is infected or compromised.
Why are hardware tokens considered more secure?
They are less vulnerable to tampering and copying, making them suitable for strong two-factor authentication.
Fill in the blank: Passwords stored in databases should be hashed with a ______ for added security.
Salt.