Shared Flashcard Set

Details

CISSP - Access Controls
CISSP - Access Controls
52
Computer Science
Graduate
04/12/2012

Additional Computer Science Flashcards

 


 

Cards

Term
What are other names for a subject and an object?
Definition
Subject - User, program, process
Object - Data, Devices
Term
What are the steps of the access control chain?
Definition
Identification -> Authentication -> Authorization -> Access the resource -> Accountability.
Term
What are the three Authentication factors, and what defines "strong authentication"?
Definition
Something you Know, Something you Are, or Something you Have. Strong is two or more of these.
Term
What are the three key aspects of issuing secure identifies?
Definition
Uniqueness (no two alike), Nondescriptive (nothing to indicate the purpose), issuance (by a trusted authority).
Term
Most Identity Management directories rely on what standard and what protocol?
Definition
X.500 and LDAP.
Term
What is a Meta-Directory?
Definition
it gathers the necessary directory information from multiple sources and physically stores them in once central database.
Term
What is a Virtual Directory?
Definition
Does not store directory data physically, but points to where the actual data resides.
Term
What is WAM?
Definition
Web Access Management software. It controls what a user can access when using a web browser to interact with enterprise assets.
Term
What is user provisioning?
Definition
the creation, maintenance, and deactivation of user object and attributes.
Term
What is a collection of data about a user called?
Definition
A Profile!
Term
What is a Federated Identity?
Definition
it is a portable identity that allows a user to be authenticated across multiple IT systems and business boundaries.
Term
In Biometrics, what is the difference between Type I and Type II errors?
Definition
Type I is false rejections, Type II is false acceptance.
Term
What are the two categories of biometrics?
Definition
Physiological and Behavioral.
Term
What is the CER and the EER?
Definition
(Both the same) Cross-over Error Rate / Equal Error Rate - it is the point where the false rejections rate equals the false acceptance rate.
Term
What is the most accurate Biometric technique?
Definition
Iris Scan
Term
What are the three behavioral biometrics?
Definition
Signature dynamical, Keystroke dynamics, and voice print.
Term
What is a Synchronous Token Device?
Definition
It links up with a authentication service by using time or a counter as the core piece of the authentication process.
Term
What is a passphrase?
Definition
a sequence of characters that is longer than a password.
Term
What can be created from a passphrase?
Definition
a Virtual Password
Term
What are the three types of SmartCard attacks?
Definition
Fault generation (reverse-engineering the encryption), Side-Channel (noninvasive; watching to see how it works), or Microprobing (directly tapping into the ROM chips.
Term
What is Kerberos?
Definition
A symmetric key, end-to-end encryption/security, single-sign-on system for distributed environments.
Term
What is the most important component of Kerberos?
Definition
the KDC (Key Distribution Center)
Term
What is a Domain called in Kerberos?
Definition
Realm
Term
What is used in Kerberos to fight replay attacks?
Definition
Timestamps
Term
What is SESAME?
Definition
The European version of Kerberos that uses both Symmetric and Asymmetric key cryptography.
Term
What are the three access control models?
Definition
DAC, MAC, and RBAC.
Term
Regarding Access Controls, what is DAC?
Definition
Discretionary access control. Enables the owner to specify who can access specific resources, most commonly through ACLs.
Term
Regarding Access Controls, what is MAC?
Definition
The operation system makes the decision based on a security label system. (Military System)
Term
Regarding Access Controls, what is RBAC?
Definition
A.K.A. non-discretionary access controls - use a centrally administered set of access controls, makes it great for high turnovers!
Term
What are software and hardware Guards?
Definition
They allow the exchange of data between trusted and less-trusted systems and environments.
Term
What are the two types of separation of duties under Hierarchical RBAC?
Definition
Static Separation of Duty (SSD - meaning users can only be a part of ONE group.)
Dynamic Separation of Duties (DSD - Can be a member of more than one ground, but only one can be active at a time.
Term
What is Rule-Based Access Control?
Definition
Based on "if x then y" programming rules. Like an ACL or Firewall.
Term
What are the Access Control Techniques?
Definition
Rule-Based (routers, ACLs), Constrained User Interface (Kiosk PC, ATM), ACL (bound to the object), Capability table (Tokens, kicket, key).
Term
What is the difference between Content and Context dependant?
Definition
Content deals with object context, like a web filter or spam filter, and Context is a based on the context of a data set, sequence, situation, or state, like a stateful firewall.
Term
What are the three access control management systems?
Definition
RADIUS (UDP based), TACACS (Cisco, TCP, encrypts all data between client and server), and DIAMETER.
Term
What central access control management system is better for environments that require sophisticated authentication steps?
Definition
TACACS
Term
What are the three services provided by AAA?
Definition
Authentication, Authorization, Accounting.
Term
What is another way to describe decentralized access control administration?
Definition
As a Work-group model.
Term
What are the seven different access control types, and give examples?
Definition
1. Deterrent (discourage) - lighting, signs.
2. Preventive (avoid) - background check, fence, badges.
3. Corrective (fix) - Anitvirus, images.
4. Recovery (restore) - backups, offsite storage.
5. Detective (discovery) - Audit logs and files.
6. Compensating (alternates) - pretty much everything
7. Directive - mandatory controls due to regulations or the environment.
Term
Define Scrubbing as it relates to audit logs.
Definition
Deleting specific incriminating data.
Term
What is the acronym for Emanation Security?
Definition
TEMPEST
Term
What are the three generic IDS types?
Definition
Signature based, Anomaly-based, and Rule Based.
Term
What are some characteristic of Signature-based IDS's?
Definition
AKA Knowledge base, uses pattern matching - like an antivirus system - or stateful matching. They cannot detect new attacks
Term
What are some characteristic of Anomaly-based IDS's?
Definition
Creates a 'normal' profile and compares network behavior. Three types - Statistical (uses profile), Protocol (IDs uncommonly used protocols), and Traffic (unusual loads). They CAN detect new attacks.
Term
What are some characteristic of Rule-based IDS's?
Definition
They care considered expert systems. Uses IF/THEN programming, and allow for artificial intelligence.
Term
What is the key difference between an IDS and an IPS?
Definition
An IPS fights back!
Term
Explain network sniffing as a threat to access control.
Definition
analyzing network traffic
Term
Explain a dictionary attack as a threat to access control.
Definition
using a pre-hashed list of passwords
Term
Explain brute force as a threat to access control.
Definition
trying every possible combination for a password
Term
Explain spoofing as a threat to access control.
Definition
faking credentials or a logon screen
Term
Explain phishing sniffing as a threat to access control.
Definition
social engineering
Term
Explain pharming as a threat to access control.
Definition
combined with DNS poisoning, directs a user to a fake website.
Supporting users have an ad free experience!