Shared Flashcard Set

Details

Domain 1 - Access Control
CISSP - Domain 1 - Access Control - Terms From AIO 6th Addition
112
Computer Networking
Professional
11/21/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
Access controls
Definition
security features that control how users and systems communicate and interact with other systems and resources
Term
Access
Definition
the flow of information between a subject and an object
Term
Subject
Definition
An active entity that requests access to an object or the data within an object
Term
object
Definition
a passive entity that contains information or needed functionality
Term
availability
Definition
Ability to access an object or file
Term
integrity
Definition
protecting data, or a resource, from being altered in an unauthorized fashion
Term
Confidentiality
Definition
the assurance that information is not disclosed to unauthorized individuals, programs, or processes
Term
Identification
Definition
a method of ensuring that a subject (user, program, or process) is the entity it claims to be
Term
authentication
Definition
the subject is usually required to provide a second piece to the credential set. This piece could be a password, passphrase, cryptographic key, personal identification number (PIN), anatomical attribute, or token.
Term
Authorization
Definition
the system determines what the subject may access to
Term
Accountability
Definition
Audit logs and monitoring to track subject activities with objects
Term
Logical access controls
Definition
technical tools used for identification, authentication, authorization, and accountability. They are software components that enforce access control measures for systems, programs, processes, and information
Term
race condition
Definition

when processes carry out their tasks on a shared resource in an incorrect order

 

In software, when the authentication and authorization steps are split into two functions, there is a possibility an attacker could use a race condition to force the authorization step to be completed before the authentication step. This would be a flaw in the software that the attacker has figured out how to exploit.

Term
Strong authentication
Definition
contains two out of these three methods: something a person knows, has, or is
Term
Identity management
Definition
a broad and loaded term that encompasses the use of different products to identify, authenticate, and authorize users through automated means
Term
Directory service
Definition
allows an administrator to configure and manage how identification, authentication, authorization, and access control take place within the network and on individual systems
Term
namespaces
Definition
a way of identifying and naming the objects the directory will manage
Term
meta-directory
Definition
gathers the necessary information from multiple sources and stores it in one central directory
Term
virtual directory
Definition
virtual directory does not have the identity data in its directory but points to where the actual data reside
Term
Web access management (WAM)
Definition
Controls what users can access when using a web browser to interact with web-based enterprise assets
Term
Legacy single sign-on
Definition
allows a user to authenticate one time and then access resources in the environment without needing to re-authenticate.
Term
Account Management
Definition
deals with creating user accounts on all systems, modifying the account privileges when necessary, and decommissioning the accounts when they are no longer needed
Term
User provisioning
Definition
the creation, maintenance, and deactivation of user objects and attributes as they exist in one or more systems, directories, or applications, in response to business processes.
Term
Authoritative System of Record
Definition
a hierarchical tree-like structure system that tracks subjects and their authorization chains
Term
federated identity
Definition
a portable identity, and its associated entitlements, that can be used across business boundaries. It allows a user to be authenticated across multiple IT systems and enterprises
Term
Digital identity
Definition
A user’s identity can be a collection of her attributes (department, role in company, shift time, clearance, and others); her entitlements (resources available to her, authoritative rights in the company, and so on); and her traits (biometric information, height, sex, and so forth).
Term
Web portals
Definition
Parts of a website that act as a point of access to information. A portal presents information from diverse sources in a unified manner. It can offer various services, as in e-mail, news updates, stock prices, data access, price lookups, access to databases, and entertainment
Term
Web portlets
Definition
pluggable user-interface software components that present information from other systems
Term
HTML
Definition

HyperText Markup Language

A markup language is a way to structure text and data sets, and it dictates how these will be viewed and used.

When you adjust margins and other formatting capabilities in a word processor, you are marking up the text in the word processor’s markup language.

If you develop a web page, you are using some type of markup language.

Term
XML
Definition
Extensible Markup Language
Term
SPML
Definition
Service Provisioning Markup Language - allows for the exchange of provisioning data between applications, allows for the automation of user management (account creation, amendments, revocation) and access entitlement configuration related to electronically published services across multiple provisioning systems.
Term
SAML
Definition
Security Assertion Markup Language - an XML standard that allows the exchange of authentication and authorization data to be shared between security domains.
Term
Web services
Definition
a collection of technologies and standards that allow services (weather updates, stock tickers, email, customer resource management, etc.) to be provided on distributed systems and be “served up” in one place.
Term
SOAP
Definition
Simple Object Access Protocol - a specification that outlines how information pertaining to web services is exchanged in a structured manner. It provides the basic messaging framework, which allows users to request a service and, in exchange, the service is made available to that user
Term
Service oriented architecture
Definition
a way to provide independent services residing on different systems in different business domains in one consistent manner. For example, if your company has a web portal that allows you to access the company’s CRM, an employee directory, and a help-desk ticketing application, this is most likely being provided through an SOA.
Term
XACML
Definition
Extensible Access Control Markup Language - used to express security policies and access rights to assets provided through web services and other enterprise applications.
Term
Biometrics
Definition
scans a person’s physiological attribute or behavioral trait and compares it to a record created in an earlier enrollment process.
Term
crossover error rate
Definition
This rating is stated as a percentage and represents the point at which the false rejection rate equals the false acceptance rate. This rating is the most important measurement when determining the system’s accuracy.
Term
Retina Scan
Definition
scans the blood-vessel pattern of the retina on the backside of the eyeball.
Term
Iris Scan
Definition
the colored portion of the eye that surrounds the pupil. The iris has unique patterns, rifts, colors, rings, coronas, and furrows.
Term
Keystroke Dynamics
Definition
captures electrical signals when a person types a certain phrase. As a person types a specified phrase, the biometric system captures the speed and motions of this action. Each individual has a certain style and speed, which translate into unique signals.
Term
hand topology
Definition
looks at the different peaks and valleys of the hand, along with its overall shape and curvature.
Term
password
Definition
a protected string of characters that is used to authenticate an individual
Term
Electronic monitoring
Definition
Listening to network traffic to capture information, especially when a user is sending her password to an authentication server.
Term
replay attack
Definition
a form of network attack in which a valid data transmission is maliciously or fraudulently repeated with the goal of obtaining unauthorized access.
Term
Brute force attacks
Definition
Performed with tools that cycle through many possible character, number, and symbol combinations to uncover a password.
Term
Dictionary attacks
Definition
Files of thousands of words are compared to the user’s password until a match is found.
Term
Social engineering
Definition
An attacker falsely convinces an individual that she has the necessary authorization to access specific resources.
Term
Rainbow table
Definition
An attacker uses a table that contains all possible passwords already in a hash format.
Term
password checker
Definition
it is used by a security professional to test the strength of a password.
Term
password cracker
Definition
Tool usually used by a hacker to crack passwords
Term
Cognitive passwords
Definition

fact- or opinion-based information used to verify an individual’s identity

 

A user is enrolled by answering several questions based on her life experiences. Ex. -  mother’s maiden name, favorite color, dog’s name, or the school she graduated from.

Term
one-time password
Definition
also called a dynamic password. It is used for authentication purposes and is only good once. After the password is used, it is no longer valid
Term
synchronous token device
Definition
synchronizes with the authentication service by using time or a counter as the core piece of the authentication process.
Term
asynchronous token
Definition
employs a challenge/response scheme to authenticate the user. In this situation, the authentication server sends the user a challenge, a random value, also called a nonce. The user enters this random value into the token device, which encrypts it and returns a value the user uses as a one-time password.
Term
passphrase
Definition
a sequence of characters that is longer than a password (thus a “phrase”) and, in some cases, takes the place of a password during an authentication process. The user enters this phrase into an application, and the application transforms the value into a virtual password, making the passphrase the length and format that is required by the application.
Term
Memory card vs. Smart card
Definition
A memory card holds information but cannot process information. A smart card holds information and has the necessary hardware and software to actually process that information.
Term
fault generation
Definition
The attacker reviews the result of an encryption function after introducing an error to the card, and also reviews the correct result, which the card performs when no errors are introduced. Analysis of these different results may allow an attacker to reverse-engineer the encryption process, with the hope of uncovering the encryption key
Term
Side-channel attacks
Definition
Nonintrusive and are used to uncover sensitive information about how a component works, without trying to compromise any type of flaw or Weakness. A noninvasive attack is one in which the attacker watches how something works and how it reacts in different situations instead of trying to “invade” it with more intrusive measures.
Term
need-to-know principle
Definition
similar to the least-privilege principle. It is based on the concept that individuals should be given access only to the information they absolutely require in order to perform their job duties.
Term
single sign-on
Definition
would allow a user to enter credentials one time and be able to access all resources allowed to user
Term
Kerberos
Definition
three-headed dog that guards the entrance to the underworld in Greek mythology. a security technology that provides authentication functionality, with the purpose of protecting a company’s assets. Kerberos is an authentication protocol and was designed in the mid-1980s as part of MIT’s Project Athena. It works in a client/server model and is based on symmetric key cryptography.
Term
Kerberos - Key Distribution Center
Definition
the most important component within a Kerberos environment. The KDC holds all users’ and services’ secret keys. It provides an authentication service, as well as key distribution functionality.
Term
Kerberos - principals
Definition
can be users, applications, or network services. The KDC must have an account for, and share a secret key with, each principal
Term
Kerberos - ticket
Definition
generated by the ticket granting service (TGS) on the KDC and given to a principal when that principal, let’s say a user, needs to authenticate to another principal, let’s say a print server.
Term
Kerberos - realm
Definition
a set of Kerboros - principals
Term
SESAME
Definition
Secure European System for Applications in a Multi-vendor Environment (SESAME) project is a single sign-on technology developed to extend Kerberos functionality and improve upon its weaknesses. SESAME uses symmetric and asymmetric cryptographic techniques to authenticate subjects to network resources.
Term
Thin Client
Definition
When the user starts the computer, it runs a short list of instructions and then points itself to a server that will actually download the operating system, or interactive operating software, to the terminal. This enforces a strict type of access control,
Term
SESAME - Privileged Attribute Certificates
Definition
SESAME uses Privileged Attribute Certificates (PACs), which contain the subject’s identity, access capabilities for the object, access time period, and lifetime of the PAC.
Term
SESAME - Privileged Attribute Server
Definition

The PAC is digitally signed so the object can validate it came from the trusted authentication server, which is referred to as the Privileged Attribute Server (PAS).

 

The PAS holds a similar role to that of the KDC within Kerberos. After a user successfully authenticates to the authentication service (AS), he is presented with a token to give to the PAS.

 

The PAS then creates a PAC for the user to present to the resource he is trying to access.

Term
access control model
Definition
a framework that dictates how subjects access objects
Term
discretionary access control model
Definition
(DAC) enables the owner of the resource to specify which subjects can access specific resources. This model is called discretionary because the control of access is based on the discretion of the owner.
Term
Sensitivity Labels
Definition

MAC model - It contains a classification and different categories. The classification indicates the sensitivity level, and the categories enforce need-to know rules

 

In a military environment, the classifications could be top secret, secret, confidential, and unclassified. Each classification is more trusted than the one below it. A commercial organization might use confidential, proprietary, corporate, and sensitive.

 

The categories can correspond to departments (UN, Information Warfare, Treasury), projects (CRM, AirportSecurity, 2011Budget), or management levels.

Term
mandatory access control model
Definition
(MAC) model, users do not have the discretion of determining who can access objects as in a DAC model. An operating system that is based upon a MAC model greatly reduces the amount of rights, permissions, and functionality a user has for security purposes. The system can be used by the user for very focused and specific purposes, and that is it. These systems are usually very specialized and are in place to protected highly classified data.
Term
Role-Based Access Control model
Definition
Access decisions are based on each subject’s role and/or functional position.
Term
Hierarchical RBAC
Definition
allows the administrator to set up an organizational RBAC model that maps to the organizational structures and functional delineations required in a specific environment.
Term
Rule-based access control
Definition
uses specific rules that indicate what can and cannot happen between a subject and an object
Term
Database views
Definition
mechanisms used to restrict user access to data contained in databases
Term
access control matrix
Definition
a table of subjects and objects indicating what actions individual subjects can take upon individual objects
Term
content-dependent access control
Definition
access to objects is determined by the content within the object
Term
Context-dependent access control
Definition
makes access decisions based on the context of a collection of information rather than on the sensitivity of the data. A system that is using context-dependent access control “reviews the situation” and then makes a decision
Term
centralized access control administration
Definition
one entity (department or individual) is responsible for overseeing access to all corporate resources. This entity configures the mechanisms that enforce access control
Term
RADIUS
Definition

Remote Authentication Dial-In User Service (RADIUS) is a network protocol that provides client/server authentication and authorization, and audits remote users

 

RADIUS is also used within corporate environments to provide road warriors and home users access to network resources. RADIUS allows companies to maintain user

profiles in a central database. The access server and RADIUS server communicate over the RADIUS protocol.When a user dials in and is properly authenticated, a preconfigured profile is assigned to him to control what resources he can and cannot access. This technology allows companies to have a single administered entry point, which provides standardization in security and a simplistic way to track usage and network statistics.

Term
TACACS
Definition

Terminal Access Controller Access Control System (TACACS) provides basically the same functionality as RADIUS with a few improvments in some of its characteristics

 

TACACS+ uses a true authentication, authorization, and accounting/audit (AAA) architecture

 

RADIUS encrypts the user’s password only as it is being transmitted from the RADIUS client to the RADIUS server

 

TACACS+ uses TCP as its transport protocol,

while RADIUS uses UDP. UDP requires more checking for droped packets

Term
protocol
Definition
protocols are just agreed-upon ways of communication
Term
Diameter
Definition

Another AAA protocol that has been developed to build upon the functionality of RADIUS and overcome many of its limitations.

 

Provides more flexibility and capabilities to meet the new demands of today’s complex and diverse networks.

Term
decentralized access control administration
Definition
gives control of access to the people closer to the resources—the people who may better understand who should and should not have access to certain files, data, and resources. In this approach, it is often the functional manager who assigns access control rights to employees
Term
security event management
Definition
(SEM) gather logs from various devices (servers, firewalls, routers, etc.) and attempt to correlate the log data and provide analysis capabilities looking for anomalies
Term
scrubbing
Definition
Deleting specific incriminating data within audit logs
Term
write-once media
Definition
CD-ROM
Term
Keystroke monitoring
Definition
a type of monitoring that can review and record keystrokes entered by a user during an active session
Term
Object reuse
Definition
pertain to reassigning to a subject media that previously contained one or more objects. This means before someone uses a hard drive, USB drive, or tape, it should be cleared of any residual information still on it.
Term
TEMPEST
Definition
outlines how to develop countermeasures that control spurious electrical signals emitted by electrical equipment
Term
White Noise
Definition
A countermeasure used to keep intruders from extracting information from electrical transmissions is white noise. White noise is a uniform spectrum of random electrical signals. It is distributed over the full spectrum so the bandwidth is constant and an intruder is not able to decipher real information from random noise or random information.
Term
Intrusion detection systems
Definition
(IDSs) are designed to detect a security breach. Intrusion detection is the process of detecting an unauthorized use of, or attack upon, a computer, network, or telecommunications infrastructure.
Term
network-based IDS
Definition

(NIDS) uses sensors, which are either host computers with the necessary software installed or dedicated appliances—each with its network interface card (NIC) in promiscuous mode

 

When a NIC is put into promiscuous mode, the NIC driver captures all traffic, makes a copy of all packets, and then passes one copy to the TCP stack and one copy to an analyzer to look for specific types of patterns.

 

An NIDS monitors network traffic and cannot “see” the activity going on inside a computer itself. To monitor the activities within a computer system, a company would need to implement a host-based IDS.

Term
host-based IDS
Definition
(HIDS) can be installed on individual workstations and/or servers to watch for inappropriate or anomalous activity
Term
signatures
Definition
Models of how the attacks are carried out
Term
Behavioral-based IDS
Definition
a behavioral-based system do not use predefined signatures, but rather are put in a learning mode to build a profile of an environment’s “normal” activities. After this profile is built, all future traffic and activities are compared to it.
Term
rule-based IDS
Definition
preconfigured rules are applied to this data to indicate whether anything suspicious is taking place. Ie. - if a root user creates two files in the same directory and then makes a call to a specific administrative tool, an alert should be sent
Term
intrusion prevention system
Definition
The goal of an IPS is to detect this activity and not allow the traffic to gain access to the target in the first place,
Term
honeypot
Definition
a computer set up as a sacrificial lamb on the network. Used to entice a would-be attacker to this computer instead of attacking authentic production systems on a network
Term
sniffer
Definition
a general term for programs or devices able to examine traffic on a LAN segment
Term
Dictionary Attack
Definition
the program hashes the dictionary words and compares the resulting message digest with the system password file that also stores its passwords in a one-way hashed format. If the hashed values match, it means a password has just been uncovered.
Term
brute force attacks
Definition
continually tries different inputs to achieve a predefined goal. Brute force is defined as “trying every possible combination until the correct one is identified".
Term
war dialing
Definition
the war dialer inserts a long list of phone numbers into a war dialing program in hopes of finding a modem that can be exploited to gain unauthorized access.
Term
Spoofing at Logon
Definition
attacker can use a program that presents to the user a fake logon screen, which often tricks the user into attempting to log on
Term
Phishing
Definition
type of social engineering with the goal of obtaining personal information, credentials, credit card number, or financial data. The attackers lure, or fish, for sensitive data through various different methods
Term
pharming
Definition
redirects a victim to a seemingly legitimate, yet fake, web site
Term
DNS poisoning
Definition
Attacker makes a DNS server resolve a host name into an incorrect IP address
Term
Vulnerability analysis
Definition
this means the organization is looking for all the holes that a bad guy could somehow exploit and enter.
Term
Threat modeling
Definition
a structured approach to identifying potential threats that could exploit vulnerabilities
Supporting users have an ad free experience!