Shared Flashcard Set

Details

01-Network Defense Chapter 12
01-Network Defense Chapter 12
55
Computer Science
Undergraduate 3
04/23/2018

Additional Computer Science Flashcards

 


 

Cards

Term
Access Control
Definition
Granting or denying approval to use specific resources.
Term
Physical Access Control
Definition
Consists of fencing, hardware door locks, and mantraps to limit contact with devices.
Term
Technical access control
Definition
Consists of technology restrictions that limit users on computers from accessing data
Term
Identification
Definition
Presenting credentials
Term
Authentication
Definition
Checking the credentials
Term
Authorization
Definition
Granting permission to take action
Term
Accounting
Definition
A record that is preserved of who accessed the network, what resources they accessed, and when they disconnected
Term
What are the steps to Access Control?
Definition
Identification, Authentication, Authorization and Accounting
Term
Object
Definition
A specific resource
Term
Subject
Definition
A user or process functioning on behalf of a user
Term
Operation
Definition
The action taken by the subject over an object
Term
Privacy officer
Definition
Ensures the enterprise complies with data privacy laws and its own privacy policies
Term
Custodian or steward
Definition
Periodically reviews securitysettings and maintains records of access by end users
Term
Owner
Definition
Determines the level of security needed for the data and delegates security duties as required
Term
End user
Definition
Follows organization’s securityguidelines and does not attempt to circumvent security
Term
Access control model
Definition
Standards that provide a predefined framework for hardware or software developers
Term
Discretionary Access Control (DAC)
Definition
•Least restrictive model
•Every object has an owner
•Owners have total control over their objects
•Owners can give permissions to other subjects over their objects
Term
What OS use Discretionary Access Control (DAC)?
Definition
Unix and Microsoft Windows
Term
What are the weaknesses of Discretionary Access Control (DAC) ?
Definition
•Poses a risk in that it relies on decision by the end user to set the proper level of security

•A subject’s permissions will be “inherited” by any programs that the subject executes
Term
What Is Mandatory Access Control (MAC)?
Definition
•User has no freedom to set any controls or distribute access to other subjects
Term
What are the two elements of Mandatory Access Control (MAC)?
Definition
Labels and Levels
Term
Mandatory Access Control (MAC) Labels
Definition
Every entity is an object and is assigned a classification label that represents the relative importance of the object

•Subjects are assigned a privilege label (clearance)
Term
Mandatory Access Control (MAC) Levels
Definition
A hierarchy based on the labels is used.

•Top secret has a higher level than secret, which has a higher level than confidential
Term
How does Mandatory Access Control (MAC) grant permissions?
Definition
By matching object labels with subject labels

•Labels indicate level of privilege
Term
How does Mandatory Access Control (MAC) determine if a file may be open?
Definition
•Object and subject labels are compared

•The subject must have equal or greater level than object to be granted access
Term
What are the two major implementations of Mandatory Access Control (MAC)?
Definition
Lattice model and Bell-LaPadula model
Term
What is the Lattice Model?
Definition
•Subjects and objects are assigned a “rung” on the lattice

•Multiple lattices can be placed beside each other
Term
What is the Bell-LaPadula (BLP) model?
Definition
•Similar to lattice model

•Subjects may not create a new object or perform specific functions on lower level objects
Term
In what environment is Mandatory Access Control (MAC) used?
Definition
Military
Term
Microsoft Windows uses a MAC implementation called...?
Definition
Mandatory Integrity Control (MIC)
Term
User Access Control (UAC)
Definition
Windows feature that controls user access to resources
Term
How Does Mandatory Integrity Control (MIC) Work?
Definition
A security identifier (SID) is issued to the user, group, or session that is used to identify the user during Windows Interactions based on the SID's integrity level.
Term
Role Based Access Control (RBAC)
Definition
Assigns permissions to particular roles in the organization and then users are assigned to roles
Term
Rule-Based Role-Based Access Control (RB-RBAC)
Definition
Dynamically assigns roles to subjects based on a set of rules defined by a custodian
Term
Attribute-Based Access Control
Definition
Uses policies that can combine attributes.

Super Flexible.
Term
Steps to Hiring a New Employee In A Microsoft Environment
Definition
•Provision the new computer

•Create email mailboxes and AD users

•Add user accounts to groups

•Create home folder

•Review security settings
Term
Steps to Firing an Employee
Definition
•Back up all employee files from local computer and server

•Archive email

•Forward email to a manager or coworker

•Hide the name from the email address book
Term
Orphaned accounts
Definition
User accounts that remain active after an employee has left
Term
Dormant account
Definition
An account that has not been accessed for a lengthy period
Term
Time-of-day restrictions
Definition
Used to limit when a user can log into their account
Term
Least privilege in access control
Definition
Only the minimum amount of privileges necessary to perform a job or function should be allocated
Term
Best Practices of Access Control
Definition
•Separation of duties

•Job rotation

•Mandatory vacations

•Clean desk policy
Term
Separation of duties
Definition
Requires that if the fraudulent application of a process could potentially result in a breach of security, the process should be divided between two or more individuals
Term
Job Rotation
Definition
Individuals periodically moved between job responsibilities
Term
Mandatory Vacations
Definition
Limits fraud, because perpetrator must be present daily to hide fraudulent actions
Term
Clean Desk Policy
Definition
Designed to ensure that all confidential or sensitive materials are removed form a user’s workspace and secured when the items not in use
Term
Technologies used to implement access control:
Definition
•Access control lists (ACLs)
•Group-based access control
Term
Access management ACL
Definition
A set of permissions attached to an object
Term
Each entry in the ACL table is called an ... ?
Definition
Access control entry (ACE)
Term
Group-based access control
Definition
Permits the configuration of multiple computers by setting a single policy for enforcement
Term
What services can be used to provide identity and access services?
Definition
•RADIUS

•Kerberos

•Terminal Access Control Access Control Systems

•Generic servers built on the Lightweight Directory Access Protocol (LDAP)

•Security Assertion Markup Language

•Authentication framework protocols
Term
Lightweight Directory Access Protocol
Definition
•Contains information about users and network devices

•Keeps track of network resources and user’s privileges to those resources

•Grants or denies access based on its information
Term
The Standard Directory of Services for LDAP is?
Definition
X.500
Term
Security Assertion Markup Language (SAML)
Definition
An Extensible Markup Language (XML) standard that allows secure web domains to exchange user authentication and authorization data
Term
Extensible Authentication Protocol (EAP)
Definition
A framework for transporting authentication protocols
Supporting users have an ad free experience!