Term
|
Definition
| Granting or denying approval to use specific resources. |
|
|
Term
|
Definition
| Consists of fencing, hardware door locks, and mantraps to limit contact with devices. |
|
|
Term
|
Definition
| Consists of technology restrictions that limit users on computers from accessing data |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Granting permission to take action |
|
|
Term
|
Definition
| A record that is preserved of who accessed the network, what resources they accessed, and when they disconnected |
|
|
Term
| What are the steps to Access Control? |
|
Definition
| Identification, Authentication, Authorization and Accounting |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A user or process functioning on behalf of a user |
|
|
Term
|
Definition
| The action taken by the subject over an object |
|
|
Term
|
Definition
| Ensures the enterprise complies with data privacy laws and its own privacy policies |
|
|
Term
|
Definition
| Periodically reviews securitysettings and maintains records of access by end users |
|
|
Term
|
Definition
| Determines the level of security needed for the data and delegates security duties as required |
|
|
Term
|
Definition
| Follows organization’s securityguidelines and does not attempt to circumvent security |
|
|
Term
|
Definition
| Standards that provide a predefined framework for hardware or software developers |
|
|
Term
| Discretionary Access Control (DAC) |
|
Definition
•Least restrictive model •Every object has an owner •Owners have total control over their objects •Owners can give permissions to other subjects over their objects |
|
|
Term
| What OS use Discretionary Access Control (DAC)? |
|
Definition
| Unix and Microsoft Windows |
|
|
Term
| What are the weaknesses of Discretionary Access Control (DAC) ? |
|
Definition
•Poses a risk in that it relies on decision by the end user to set the proper level of security
•A subject’s permissions will be “inherited” by any programs that the subject executes |
|
|
Term
| What Is Mandatory Access Control (MAC)? |
|
Definition
| •User has no freedom to set any controls or distribute access to other subjects |
|
|
Term
| What are the two elements of Mandatory Access Control (MAC)? |
|
Definition
|
|
Term
| Mandatory Access Control (MAC) Labels |
|
Definition
Every entity is an object and is assigned a classification label that represents the relative importance of the object
•Subjects are assigned a privilege label (clearance) |
|
|
Term
| Mandatory Access Control (MAC) Levels |
|
Definition
A hierarchy based on the labels is used.
•Top secret has a higher level than secret, which has a higher level than confidential |
|
|
Term
| How does Mandatory Access Control (MAC) grant permissions? |
|
Definition
By matching object labels with subject labels
•Labels indicate level of privilege |
|
|
Term
| How does Mandatory Access Control (MAC) determine if a file may be open? |
|
Definition
•Object and subject labels are compared
•The subject must have equal or greater level than object to be granted access |
|
|
Term
| What are the two major implementations of Mandatory Access Control (MAC)? |
|
Definition
| Lattice model and Bell-LaPadula model |
|
|
Term
| What is the Lattice Model? |
|
Definition
•Subjects and objects are assigned a “rung” on the lattice
•Multiple lattices can be placed beside each other |
|
|
Term
| What is the Bell-LaPadula (BLP) model? |
|
Definition
•Similar to lattice model
•Subjects may not create a new object or perform specific functions on lower level objects |
|
|
Term
| In what environment is Mandatory Access Control (MAC) used? |
|
Definition
|
|
Term
| Microsoft Windows uses a MAC implementation called...? |
|
Definition
| Mandatory Integrity Control (MIC) |
|
|
Term
| User Access Control (UAC) |
|
Definition
| Windows feature that controls user access to resources |
|
|
Term
| How Does Mandatory Integrity Control (MIC) Work? |
|
Definition
| A security identifier (SID) is issued to the user, group, or session that is used to identify the user during Windows Interactions based on the SID's integrity level. |
|
|
Term
| Role Based Access Control (RBAC) |
|
Definition
| Assigns permissions to particular roles in the organization and then users are assigned to roles |
|
|
Term
| Rule-Based Role-Based Access Control (RB-RBAC) |
|
Definition
| Dynamically assigns roles to subjects based on a set of rules defined by a custodian |
|
|
Term
| Attribute-Based Access Control |
|
Definition
Uses policies that can combine attributes.
Super Flexible. |
|
|
Term
| Steps to Hiring a New Employee In A Microsoft Environment |
|
Definition
•Provision the new computer
•Create email mailboxes and AD users
•Add user accounts to groups
•Create home folder
•Review security settings |
|
|
Term
| Steps to Firing an Employee |
|
Definition
•Back up all employee files from local computer and server
•Archive email
•Forward email to a manager or coworker
•Hide the name from the email address book |
|
|
Term
|
Definition
| User accounts that remain active after an employee has left |
|
|
Term
|
Definition
| An account that has not been accessed for a lengthy period |
|
|
Term
|
Definition
| Used to limit when a user can log into their account |
|
|
Term
| Least privilege in access control |
|
Definition
| Only the minimum amount of privileges necessary to perform a job or function should be allocated |
|
|
Term
| Best Practices of Access Control |
|
Definition
•Separation of duties
•Job rotation
•Mandatory vacations
•Clean desk policy |
|
|
Term
|
Definition
| Requires that if the fraudulent application of a process could potentially result in a breach of security, the process should be divided between two or more individuals |
|
|
Term
|
Definition
| Individuals periodically moved between job responsibilities |
|
|
Term
|
Definition
| Limits fraud, because perpetrator must be present daily to hide fraudulent actions |
|
|
Term
|
Definition
| Designed to ensure that all confidential or sensitive materials are removed form a user’s workspace and secured when the items not in use |
|
|
Term
| Technologies used to implement access control: |
|
Definition
•Access control lists (ACLs) •Group-based access control |
|
|
Term
|
Definition
| A set of permissions attached to an object |
|
|
Term
| Each entry in the ACL table is called an ... ? |
|
Definition
| Access control entry (ACE) |
|
|
Term
| Group-based access control |
|
Definition
| Permits the configuration of multiple computers by setting a single policy for enforcement |
|
|
Term
| What services can be used to provide identity and access services? |
|
Definition
•RADIUS
•Kerberos
•Terminal Access Control Access Control Systems
•Generic servers built on the Lightweight Directory Access Protocol (LDAP)
•Security Assertion Markup Language
•Authentication framework protocols |
|
|
Term
| Lightweight Directory Access Protocol |
|
Definition
•Contains information about users and network devices
•Keeps track of network resources and user’s privileges to those resources
•Grants or denies access based on its information |
|
|
Term
| The Standard Directory of Services for LDAP is? |
|
Definition
|
|
Term
| Security Assertion Markup Language (SAML) |
|
Definition
| An Extensible Markup Language (XML) standard that allows secure web domains to exchange user authentication and authorization data |
|
|
Term
| Extensible Authentication Protocol (EAP) |
|
Definition
| A framework for transporting authentication protocols |
|
|