Term
What are other names for a subject and an object? |
|
Definition
Subject - User, program, process Object - Data, Devices |
|
|
Term
What are the steps of the access control chain? |
|
Definition
Identification -> Authentication -> Authorization -> Access the resource -> Accountability. |
|
|
Term
What are the three Authentication factors, and what defines "strong authentication"? |
|
Definition
Something you Know, Something you Are, or Something you Have. Strong is two or more of these. |
|
|
Term
What are the three key aspects of issuing secure identifies? |
|
Definition
Uniqueness (no two alike), Nondescriptive (nothing to indicate the purpose), issuance (by a trusted authority). |
|
|
Term
Most Identity Management directories rely on what standard and what protocol? |
|
Definition
|
|
Term
What is a Meta-Directory? |
|
Definition
it gathers the necessary directory information from multiple sources and physically stores them in once central database. |
|
|
Term
What is a Virtual Directory? |
|
Definition
Does not store directory data physically, but points to where the actual data resides. |
|
|
Term
|
Definition
Web Access Management software. It controls what a user can access when using a web browser to interact with enterprise assets. |
|
|
Term
What is user provisioning? |
|
Definition
the creation, maintenance, and deactivation of user object and attributes. |
|
|
Term
What is a collection of data about a user called? |
|
Definition
|
|
Term
What is a Federated Identity? |
|
Definition
it is a portable identity that allows a user to be authenticated across multiple IT systems and business boundaries. |
|
|
Term
In Biometrics, what is the difference between Type I and Type II errors? |
|
Definition
Type I is false rejections, Type II is false acceptance. |
|
|
Term
What are the two categories of biometrics? |
|
Definition
Physiological and Behavioral. |
|
|
Term
What is the CER and the EER? |
|
Definition
(Both the same) Cross-over Error Rate / Equal Error Rate - it is the point where the false rejections rate equals the false acceptance rate. |
|
|
Term
What is the most accurate Biometric technique? |
|
Definition
|
|
Term
What are the three behavioral biometrics? |
|
Definition
Signature dynamical, Keystroke dynamics, and voice print. |
|
|
Term
What is a Synchronous Token Device? |
|
Definition
It links up with a authentication service by using time or a counter as the core piece of the authentication process. |
|
|
Term
|
Definition
a sequence of characters that is longer than a password. |
|
|
Term
What can be created from a passphrase? |
|
Definition
|
|
Term
What are the three types of SmartCard attacks? |
|
Definition
Fault generation (reverse-engineering the encryption), Side-Channel (noninvasive; watching to see how it works), or Microprobing (directly tapping into the ROM chips. |
|
|
Term
|
Definition
A symmetric key, end-to-end encryption/security, single-sign-on system for distributed environments. |
|
|
Term
What is the most important component of Kerberos? |
|
Definition
the KDC (Key Distribution Center) |
|
|
Term
What is a Domain called in Kerberos? |
|
Definition
|
|
Term
What is used in Kerberos to fight replay attacks? |
|
Definition
|
|
Term
|
Definition
The European version of Kerberos that uses both Symmetric and Asymmetric key cryptography. |
|
|
Term
What are the three access control models? |
|
Definition
|
|
Term
Regarding Access Controls, what is DAC? |
|
Definition
Discretionary access control. Enables the owner to specify who can access specific resources, most commonly through ACLs. |
|
|
Term
Regarding Access Controls, what is MAC? |
|
Definition
The operation system makes the decision based on a security label system. (Military System) |
|
|
Term
Regarding Access Controls, what is RBAC? |
|
Definition
A.K.A. non-discretionary access controls - use a centrally administered set of access controls, makes it great for high turnovers! |
|
|
Term
What are software and hardware Guards? |
|
Definition
They allow the exchange of data between trusted and less-trusted systems and environments. |
|
|
Term
What are the two types of separation of duties under Hierarchical RBAC? |
|
Definition
Static Separation of Duty (SSD - meaning users can only be a part of ONE group.) Dynamic Separation of Duties (DSD - Can be a member of more than one ground, but only one can be active at a time. |
|
|
Term
What is Rule-Based Access Control? |
|
Definition
Based on "if x then y" programming rules. Like an ACL or Firewall. |
|
|
Term
What are the Access Control Techniques? |
|
Definition
Rule-Based (routers, ACLs), Constrained User Interface (Kiosk PC, ATM), ACL (bound to the object), Capability table (Tokens, kicket, key). |
|
|
Term
What is the difference between Content and Context dependant? |
|
Definition
Content deals with object context, like a web filter or spam filter, and Context is a based on the context of a data set, sequence, situation, or state, like a stateful firewall. |
|
|
Term
What are the three access control management systems? |
|
Definition
RADIUS (UDP based), TACACS (Cisco, TCP, encrypts all data between client and server), and DIAMETER. |
|
|
Term
What central access control management system is better for environments that require sophisticated authentication steps? |
|
Definition
|
|
Term
What are the three services provided by AAA? |
|
Definition
Authentication, Authorization, Accounting. |
|
|
Term
What is another way to describe decentralized access control administration? |
|
Definition
|
|
Term
What are the seven different access control types, and give examples? |
|
Definition
1. Deterrent (discourage) - lighting, signs. 2. Preventive (avoid) - background check, fence, badges. 3. Corrective (fix) - Anitvirus, images. 4. Recovery (restore) - backups, offsite storage. 5. Detective (discovery) - Audit logs and files. 6. Compensating (alternates) - pretty much everything 7. Directive - mandatory controls due to regulations or the environment. |
|
|
Term
Define Scrubbing as it relates to audit logs. |
|
Definition
Deleting specific incriminating data. |
|
|
Term
What is the acronym for Emanation Security? |
|
Definition
|
|
Term
What are the three generic IDS types? |
|
Definition
Signature based, Anomaly-based, and Rule Based. |
|
|
Term
What are some characteristic of Signature-based IDS's? |
|
Definition
AKA Knowledge base, uses pattern matching - like an antivirus system - or stateful matching. They cannot detect new attacks |
|
|
Term
What are some characteristic of Anomaly-based IDS's? |
|
Definition
Creates a 'normal' profile and compares network behavior. Three types - Statistical (uses profile), Protocol (IDs uncommonly used protocols), and Traffic (unusual loads). They CAN detect new attacks. |
|
|
Term
What are some characteristic of Rule-based IDS's? |
|
Definition
They care considered expert systems. Uses IF/THEN programming, and allow for artificial intelligence. |
|
|
Term
What is the key difference between an IDS and an IPS? |
|
Definition
|
|
Term
Explain network sniffing as a threat to access control. |
|
Definition
analyzing network traffic |
|
|
Term
Explain a dictionary attack as a threat to access control. |
|
Definition
using a pre-hashed list of passwords |
|
|
Term
Explain brute force as a threat to access control. |
|
Definition
trying every possible combination for a password |
|
|
Term
Explain spoofing as a threat to access control. |
|
Definition
faking credentials or a logon screen |
|
|
Term
Explain phishing sniffing as a threat to access control. |
|
Definition
|
|
Term
Explain pharming as a threat to access control. |
|
Definition
combined with DNS poisoning, directs a user to a fake website. |
|
|