Week 11 Flashcards

1
Q

What are the two management steps in access control?

A

Authentication and Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Authentication in the context of access control.

A

Verifying identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Authorization in the context of access control.

A

Granting permissions based on identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Subject in access control?

A

The access requester (user or machine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Object in access control?

A

The resource being accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What role does the Reference Monitor play in access control?

A

Enforces access policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the steps in the access control procedure.

A
  • Access Request
  • Authentication
  • Authorization
  • Access Decision
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Discretionary Access Control (DAC)?

A

Users define their own access control rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provide an example of Discretionary Access Control.

A

File permissions in operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Mandatory Access Control (MAC)?

A

A central authority defines strict access rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provide an example of Mandatory Access Control.

A

Military security classification systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Role-Based Access Control (RBAC)?

A

Access is assigned based on predefined roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provide an example of Role-Based Access Control.

A

Enterprise user permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Attribute-Based Access Control (ABAC)?

A

Access is granted based on attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provide an example of Attribute-Based Access Control.

A

Cloud-based security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Risk-Based Access Control (RAC)?

A

Access is decided based on calculated risk levels

17
Q

What is Federated Identity Management (FIM)?

A

Authentication and authorization are separated

18
Q

Who handles Authentication in Federated Identity Management?

A

Identity Providers (IdPs)

19
Q

Who handles Authorization in Federated Identity Management?

A

Service Providers (SPs)

20
Q

What is a key aspect of the Trust Model in FIM?

A

Users trust IdPs, but SPs do not trust users directly

21
Q

What does the UK Online Safety Act 2023 relate to?

A

Cybersecurity laws and regulations

22
Q

What does the EU GDPR (2016) define?

A

Individual rights such as right to be informed, access data, and erasure

23
Q

What are the Seven Key Steps for Data Protection Impact Assessments (DPIAs)?

A
  • Identify the need for a DPIA
  • Describe the processing
  • Consider consultation
  • Assess necessity and proportionality
  • Identify and assess risks
  • Implement risk mitigation measures
  • Document outcomes
24
Q

What does the CIA Triad stand for?

A
  • Confidentiality
  • Integrity
  • Availability
25
What is the PAIN model in security?
* Privacy * Availability * Integrity * Non-Repudiation
26
What are the challenges of security vs. usability?
* Users want convenience, not security * Complex systems increase user frustration * Higher security often leads to higher costs and slower processes
27
Fill in the blank: Strong passwords are hard to _______.
remember
28
What are the performance metrics for biometric authentication?
* False Accept Rate (FAR) * False Reject Rate (FRR) * Failure to Enrol (FTE)
29
What is a challenge of biometric systems?
No biometric system has 0% error rate
30
What are alternative authentication methods?
* Graphical passwords * Hardware tokens * Risk-based authentication * Multi-Factor Authentication (MFA) * Single Sign-On (SSO)
31
What does ISO 9241-11 (2018) define as usability concepts?
* Effectiveness * Efficiency * Satisfaction
32
What are extended usability concepts mentioned in ISO 9241-11?
* Accessibility * User Experience (UX) * Avoidance of Harm
33
What is the concept of Resilience in usability?
System withstands failures
34
What is the concept of Scalability in usability?
Adapts to increased usage
35
What is the concept of Sustainability in usability?
Long-term usability