Shared Flashcard Set

Details

Chapter 5 Access control
N/A
76
Computer Science
Graduate
02/11/2014

Additional Computer Science Flashcards

 


 

Cards

Term
___ is the policy driven control of access to systems data and dialogues
Definition
access control
Term
___ is central to access control
Definition
policy
Term
access controls have three functions, what are they.
Definition
authentication: identifying individuals claiming to have permission to a resource
authorizations: specific permissions that a particular authenticated user should have
auditing: collecting information about an individual's activities in log files
Term
to be authenticated, you must show verifier credentials that are based on one of the following
Definition
what you know (password/key)
what you have (physical key/smart card)
who you are (finger print)
what you know (how to pronounce a passphrase)
Term
two different forms of authentication must be used for access is ___
Definition
two factor authentication
Term
uses more than two forms of authentication for access
Definition
multifactor authentication
Term
___ and ___ can negate the strength of two factor authentication
Definition
trojan horses (can send transactions after a user has already authenticated them self)
man in the middle attack (user logs into a fake banking site, the fake site steals the info as the go betweeen)
Term
___ is based on organizational roles rather than individual people
Definition
role based access control RBAC
Term
With RBAC, creating access control rules is ___ than assigning control rules individually. It also lessens the opportunity for ___.
Definition
cheaper
errors
Term
in ___ departments have no ability to alter access control set by higher authorities. this is used by the ___ and ___
Definition
mandatory access control
military
national security organizations
Term
___ is when the department has discretion over giving access to individuals within policy standards set by higher authorities
Definition
discretionary access control
Term
___ is a system that rates documents by sensitivity (Secret, TS, TS/SCI)
Definition
multilevel security
Term
ISO/IEC 27002 security clause 9 covers ___
Definition
physical and environmental security
Term
Security clause 9 covers 2 categories. what are they.
Definition
9.1 = Secure areas which covers securing physical areas (buildings, equipment rooms, office areas, etc)
9.2 = equipment security
Term
discuss the controls of ISO/IEC 27002 9.1
Definition
securing building's physical perimeter
implementing physical entry controls
access should be justified authorized logged and monitored
securing public access, delivery and loading areas
securing offices, rooms and facilities
protecting against external and environmental threats
creating rules for working in secure areas
limit unsupervised work, forbid data recording devices
Term
discuss the controls of ISO/IEC 27002 9.2
Definition
equipment siting and protection (siting means placing)
supporting utilities (power, water, HVAC)
UPS, generators, and frequent testing
cabling security (conduits, underground wiring)
security during off site equipment maintenance
permission fro removal of sensitive information if taken off site
security of equipment off premises
constant attendance except when locked securely
insurance
Secure disposal or reuse of equipment
removal of all sensitive information
rules for the removal of property
Term
___ is when an authorized user opens a door with an access device and an intruder follows through
Definition
piggybacking/tailgating
Term
ISO/IEC 27002 refers to monitoring. What are some remote monitoring methods and issues
Definition
CCTV: use digital not tape, resolution, storage, time for storing
motion detection: records feed when tripped, can be programmed for certain types of motion.
Term
___ is when an attacker goes through a firm's trash bins looking for documents, tapes, or other media
Definition
dumpster diving
Term
___ is the most common access control
Definition
passwords
Term
Using an account name, which isn't secret, and its secret password is ___
Definition
reusable password
Term
a way to exploit a machine with physical access is to copy the password file and crack it later. This is less ___ than taking the time to run a ___ on a server in person.
Definition
obtrusive
password-cracking program
Term
___ manage multiple passwords automatically
Definition
password management programs
Term
What are some good password policies
Definition
not using the same password at multiple sites
password duration
shared password (makes auditing impossible)
disabling passwords that are no longer valid
lost passwords
opportunity for social engineering
automated password reset
can be beaten with some research
password policies call for passwords to be long and complex
8+ characters long
change of case, not at beginning
digit 0-9, not at the end
special character, not at the end
new passwords every 90 days
store password as hashes
Term
what are shared passwords bad
Definition
rarely changed
because "everyone knows it" it is more likely to be shared
auditing is impossible
Term
how do you combat shared passwords
Definition
create group lists from individual accounts
Term
why are many passwords in corporations inappropriate?
Definition
person left the firm
moved to a different position
account was for a temporary contractor
Term
what % of passwords are inappropriate?
Definition
30-60%
Term
___ prompts roughly 1/4 of all help desk calls
Definition
lost passwords
Term
___ is potentially the weakest link in the use of passwords, especially the self service reset
Definition
password reset
Term
___ are a primary target for hackers
Definition
usernames and passwords
Term
operating systems automatically hash and store passwords, ___ and ___ don't
Definition
online applications
e-commerce sites
Term
___ is a plastic card that usually is the size of a credit card and is used in a reader for access
Definition
access card
Term
___ looks like a magnetic stripe card but has a built in microprocessor and memory.
Definition
smart card.
Term
a problem with access cards and smart cards is the cost and availability of the ___
Definition
card readers
Term
an authentication ___ represents the person wishing to be authenticated
Definition
token
Term
a ___ is a small device with a display that has a number that changes frequently.
Definition
one time password token
Term
a ___ is a small device that plugs into a computer's USB port to identify the owner
Definition
USB token
Term
an alternative to tokens and cards is ___.
Definition
RFID
Term
___ is based on biological measurements
Definition
biometric authentication
Term
to be enrolled in a biometric system, there are three steps to go through. what are the
Definition
1. Enrollment Data:reader scans the person's bioetric data

2. Key Features: reader then processes the scan to extract key features

3. Template: reader sends key feature information to the database which stores it as a template
Term
Biometric readers processes ___ information to create key features. These key features become the ___
Definition
supplicant scanning
user access data
Term
___ refers to the accuracy when the supplicant is not trying to deceive the system.

Whereas, ___ is the likelihood that an impostor will be able to deceive the system if he or she tries.
Definition
error rate

deception rate
Term
___ means that the person is matched to a particular template

___ is a match to a template that should not have been made

the rate of acceptances as a percentage of total access attempts is called ___
Definition
acceptance

false acceptance

false acceptance rate (FAR)
Term
___ is when the supplicant is incorrectly rejected as a match to a template when they should be accepted.

___ is the probability that the system will reject a person who should be matched to a template.
Definition
False Rejection

False rejection rate (FRR)
Term
what are the uses for biometrics
Definition
verification
identification
watch lists
Term
___ is when a supplicant claims to be a particular person and the challenge is to measure the supplicant's biometric access data against the template of the person they claim to be.
Definition
verification
Term
___: the supplicant doesn't claim to be a particular person. it is the job of the system to identify the supplicant.
Definition
identification
Term
in identification, the supplicant's biometric access data is matched against:
Definition
everyone's template that is stored in the system
Term
___ identifies a person as being a member of a group.
Definition
watch lists
Term
___ is when an attacker deliberately attempts to fool the biometric system
Definition
deception
Term
___ is a well developed and inexpensive biometric technology.
Definition
fingerprint recognition
Term
a ___ is the difference between the scan's key features and template. if the error is smaller than a value added the ___, the supplicant is accepted as a match
Definition
match index
decision criterion
Term
___ is an invisible print left on a glass or other object
Definition
latent print
Term
___ is the most precise form of biometric authentication with very low FAR
Definition
iris recognition
Term
___ is useful for door access control. However, it is highly sensitive to lighting differences between the stored image and real life scan
Definition
facial recognition
Term
the major benefit o face recognition is it can be used ___
Definition
surreptitiously
Term
___ is easily deceived by recordings and there are high FRR
Definition
voice recognition
Term
what are the most widely used types of biometric authentication? which one is dominant?
Definition
fingerprint, iris, face and hand geometry

fingerprint
Term
___ is accepting public keys and the providing of new digital certificates to users
Definition
provisioning
Term
___ states unless individuals are carefully vetted before being allowed into the system, impostors can enroll through social engineering
Definition
prime authentication problem
Term
___ means each person should only get the permissions that he or she absolutely needs
Definition
principle of least permission
Term
Single Sign On is a good long term objective, however ___ sign on is all an organization can accomplis
Definition
reduced
Term
in ___ an employee can log in once and receive service from several servers but not all of them
Definition
reduced sign on
Term
___ are central repositories for information about people, equipment, software and databases
Definition
directory servers
Term
authentication servers communicate with directory servers using the ___
Definition
LIghtweight Directory Access Protocol LDAP
Term
companies usually divide their resources into multiple ___
Definition
active directory domains
Term
Domain X has a single ___ server which controls the resources in the domain
Definition
domain controller
Term
Domain Y has Two domain controllers. what are they
Definition
Trees.

Forests
Term
___ means that one directory server will accept information from another
Definition
trust
Term
___ gets the directory servers to exchange information and to synchronize services in a variety of ways
Definition
metadirectory server
Term
when talking in-between companies, you use ___
Definition
federated identity management
Term
the dominant standard for sending security assertions today is the ___
Definition
security assertion markup language SAML
Term
___ is the policy based management of all information required for access to corporate systems by people machines programs or other resourcces
Definition
identity management
Term
is a system where the user authenticates them self to the identity management server once
Definition
single sign on SSO
Term
Identity management consists of:
Definition
initial credential checking
defining identities
trust relationships
provisioning
decentralization
self service functions
Supporting users have an ad free experience!