Week 10 - Systems Security Flashcards
Achieving the security of CIA and non-repudiation depends on?
Authentication - identity to entity
Malware is?
intrusive software designed to damage or take control of a system
NCSC - reduce reliance on passwords
use single sign on (SSO) - ues MFA to check identity then grants a token that can be used instead of password.
NCSC -implement technical solutions
use controls such as max number of authentication attempts
NCSC - protect all password
encryption
NCSC - password overload
human factor, password management systems, good practices and against password expiry
NCSC - help generate better passwords
use machine generated passwords, or “three random words”
NCSC - training
provide guidance and advice
DoS is?
Denial of service, high level of requests over a network which floods the machine/network, responses fail
combination of authentication and authorisation is?
access control
Access control list (ACL)
a list of who has authorisation to communicate with whom
Specifying authorisation rules, terms used?
subject entity
object the asset on which the operation is being performed
action the operation being attempted
permission allowed or denied
two key security properties that authorisation enables in a system:
least privilege
authorisation to perform minimal set of operations to complete function
separation of privileges
separation of duties so that no 1 employee is given enough privilege to misuse the system
Mandatory access control (MAC)?
Access to resources is strictly controlled by the operating system (OS) as specified by the system administrator
Advantages of MAC?
high level security, every subject and object has sensitivity label with NWU and NRD