Term
___ is the policy driven control of access to systems data and dialogues |
|
Definition
|
|
Term
___ is central to access control |
|
Definition
|
|
Term
access controls have three functions, what are they. |
|
Definition
authentication: identifying individuals claiming to have permission to a resource authorizations: specific permissions that a particular authenticated user should have auditing: collecting information about an individual's activities in log files |
|
|
Term
to be authenticated, you must show verifier credentials that are based on one of the following |
|
Definition
what you know (password/key) what you have (physical key/smart card) who you are (finger print) what you know (how to pronounce a passphrase) |
|
|
Term
two different forms of authentication must be used for access is ___ |
|
Definition
two factor authentication |
|
|
Term
uses more than two forms of authentication for access |
|
Definition
multifactor authentication |
|
|
Term
___ and ___ can negate the strength of two factor authentication |
|
Definition
trojan horses (can send transactions after a user has already authenticated them self) man in the middle attack (user logs into a fake banking site, the fake site steals the info as the go betweeen) |
|
|
Term
___ is based on organizational roles rather than individual people |
|
Definition
role based access control RBAC |
|
|
Term
With RBAC, creating access control rules is ___ than assigning control rules individually. It also lessens the opportunity for ___. |
|
Definition
|
|
Term
in ___ departments have no ability to alter access control set by higher authorities. this is used by the ___ and ___ |
|
Definition
mandatory access control military national security organizations |
|
|
Term
___ is when the department has discretion over giving access to individuals within policy standards set by higher authorities |
|
Definition
discretionary access control |
|
|
Term
___ is a system that rates documents by sensitivity (Secret, TS, TS/SCI) |
|
Definition
|
|
Term
ISO/IEC 27002 security clause 9 covers ___ |
|
Definition
physical and environmental security |
|
|
Term
Security clause 9 covers 2 categories. what are they. |
|
Definition
9.1 = Secure areas which covers securing physical areas (buildings, equipment rooms, office areas, etc) 9.2 = equipment security |
|
|
Term
discuss the controls of ISO/IEC 27002 9.1 |
|
Definition
securing building's physical perimeter implementing physical entry controls access should be justified authorized logged and monitored securing public access, delivery and loading areas securing offices, rooms and facilities protecting against external and environmental threats creating rules for working in secure areas limit unsupervised work, forbid data recording devices |
|
|
Term
discuss the controls of ISO/IEC 27002 9.2 |
|
Definition
equipment siting and protection (siting means placing) supporting utilities (power, water, HVAC) UPS, generators, and frequent testing cabling security (conduits, underground wiring) security during off site equipment maintenance permission fro removal of sensitive information if taken off site security of equipment off premises constant attendance except when locked securely insurance Secure disposal or reuse of equipment removal of all sensitive information rules for the removal of property |
|
|
Term
___ is when an authorized user opens a door with an access device and an intruder follows through |
|
Definition
|
|
Term
ISO/IEC 27002 refers to monitoring. What are some remote monitoring methods and issues |
|
Definition
CCTV: use digital not tape, resolution, storage, time for storing motion detection: records feed when tripped, can be programmed for certain types of motion. |
|
|
Term
___ is when an attacker goes through a firm's trash bins looking for documents, tapes, or other media |
|
Definition
|
|
Term
___ is the most common access control |
|
Definition
|
|
Term
Using an account name, which isn't secret, and its secret password is ___ |
|
Definition
|
|
Term
a way to exploit a machine with physical access is to copy the password file and crack it later. This is less ___ than taking the time to run a ___ on a server in person. |
|
Definition
obtrusive password-cracking program |
|
|
Term
___ manage multiple passwords automatically |
|
Definition
password management programs |
|
|
Term
What are some good password policies |
|
Definition
not using the same password at multiple sites password duration shared password (makes auditing impossible) disabling passwords that are no longer valid lost passwords opportunity for social engineering automated password reset can be beaten with some research password policies call for passwords to be long and complex 8+ characters long change of case, not at beginning digit 0-9, not at the end special character, not at the end new passwords every 90 days store password as hashes |
|
|
Term
what are shared passwords bad |
|
Definition
rarely changed because "everyone knows it" it is more likely to be shared auditing is impossible |
|
|
Term
how do you combat shared passwords |
|
Definition
create group lists from individual accounts |
|
|
Term
why are many passwords in corporations inappropriate? |
|
Definition
person left the firm moved to a different position account was for a temporary contractor |
|
|
Term
what % of passwords are inappropriate? |
|
Definition
|
|
Term
___ prompts roughly 1/4 of all help desk calls |
|
Definition
|
|
Term
___ is potentially the weakest link in the use of passwords, especially the self service reset |
|
Definition
|
|
Term
___ are a primary target for hackers |
|
Definition
|
|
Term
operating systems automatically hash and store passwords, ___ and ___ don't |
|
Definition
online applications e-commerce sites |
|
|
Term
___ is a plastic card that usually is the size of a credit card and is used in a reader for access |
|
Definition
|
|
Term
___ looks like a magnetic stripe card but has a built in microprocessor and memory. |
|
Definition
|
|
Term
a problem with access cards and smart cards is the cost and availability of the ___ |
|
Definition
|
|
Term
an authentication ___ represents the person wishing to be authenticated |
|
Definition
|
|
Term
a ___ is a small device with a display that has a number that changes frequently. |
|
Definition
|
|
Term
a ___ is a small device that plugs into a computer's USB port to identify the owner |
|
Definition
|
|
Term
an alternative to tokens and cards is ___. |
|
Definition
|
|
Term
___ is based on biological measurements |
|
Definition
|
|
Term
to be enrolled in a biometric system, there are three steps to go through. what are the |
|
Definition
1. Enrollment Data:reader scans the person's bioetric data
2. Key Features: reader then processes the scan to extract key features
3. Template: reader sends key feature information to the database which stores it as a template |
|
|
Term
Biometric readers processes ___ information to create key features. These key features become the ___ |
|
Definition
supplicant scanning user access data |
|
|
Term
___ refers to the accuracy when the supplicant is not trying to deceive the system.
Whereas, ___ is the likelihood that an impostor will be able to deceive the system if he or she tries. |
|
Definition
|
|
Term
___ means that the person is matched to a particular template
___ is a match to a template that should not have been made
the rate of acceptances as a percentage of total access attempts is called ___ |
|
Definition
acceptance
false acceptance
false acceptance rate (FAR) |
|
|
Term
___ is when the supplicant is incorrectly rejected as a match to a template when they should be accepted.
___ is the probability that the system will reject a person who should be matched to a template. |
|
Definition
False Rejection
False rejection rate (FRR) |
|
|
Term
what are the uses for biometrics |
|
Definition
verification identification watch lists |
|
|
Term
___ is when a supplicant claims to be a particular person and the challenge is to measure the supplicant's biometric access data against the template of the person they claim to be. |
|
Definition
|
|
Term
___: the supplicant doesn't claim to be a particular person. it is the job of the system to identify the supplicant. |
|
Definition
|
|
Term
in identification, the supplicant's biometric access data is matched against: |
|
Definition
everyone's template that is stored in the system |
|
|
Term
___ identifies a person as being a member of a group. |
|
Definition
|
|
Term
___ is when an attacker deliberately attempts to fool the biometric system |
|
Definition
|
|
Term
___ is a well developed and inexpensive biometric technology. |
|
Definition
|
|
Term
a ___ is the difference between the scan's key features and template. if the error is smaller than a value added the ___, the supplicant is accepted as a match |
|
Definition
match index decision criterion |
|
|
Term
___ is an invisible print left on a glass or other object |
|
Definition
|
|
Term
___ is the most precise form of biometric authentication with very low FAR |
|
Definition
|
|
Term
___ is useful for door access control. However, it is highly sensitive to lighting differences between the stored image and real life scan |
|
Definition
|
|
Term
the major benefit o face recognition is it can be used ___ |
|
Definition
|
|
Term
___ is easily deceived by recordings and there are high FRR |
|
Definition
|
|
Term
what are the most widely used types of biometric authentication? which one is dominant? |
|
Definition
fingerprint, iris, face and hand geometry
fingerprint |
|
|
Term
___ is accepting public keys and the providing of new digital certificates to users |
|
Definition
|
|
Term
___ states unless individuals are carefully vetted before being allowed into the system, impostors can enroll through social engineering |
|
Definition
prime authentication problem |
|
|
Term
___ means each person should only get the permissions that he or she absolutely needs |
|
Definition
principle of least permission |
|
|
Term
Single Sign On is a good long term objective, however ___ sign on is all an organization can accomplis |
|
Definition
|
|
Term
in ___ an employee can log in once and receive service from several servers but not all of them |
|
Definition
|
|
Term
___ are central repositories for information about people, equipment, software and databases |
|
Definition
|
|
Term
authentication servers communicate with directory servers using the ___ |
|
Definition
LIghtweight Directory Access Protocol LDAP |
|
|
Term
companies usually divide their resources into multiple ___ |
|
Definition
|
|
Term
Domain X has a single ___ server which controls the resources in the domain |
|
Definition
|
|
Term
Domain Y has Two domain controllers. what are they |
|
Definition
|
|
Term
___ means that one directory server will accept information from another |
|
Definition
|
|
Term
___ gets the directory servers to exchange information and to synchronize services in a variety of ways |
|
Definition
|
|
Term
when talking in-between companies, you use ___ |
|
Definition
federated identity management |
|
|
Term
the dominant standard for sending security assertions today is the ___ |
|
Definition
security assertion markup language SAML |
|
|
Term
___ is the policy based management of all information required for access to corporate systems by people machines programs or other resourcces |
|
Definition
|
|
Term
is a system where the user authenticates them self to the identity management server once |
|
Definition
|
|
Term
Identity management consists of: |
|
Definition
initial credential checking defining identities trust relationships provisioning decentralization self service functions |
|
|