Shared Flashcard Set

Details

CISSP: Access Control Domain
CISSP Access Control Domain from CBK Book
61
Computer Science
Professional
07/14/2012

Additional Computer Science Flashcards

 


 

Cards

Term
The Information Security Triad consists of which three areas?
Definition
Confidentiality, Integrity, and Availability
Term
In reference to the Information Security Triad, What does Confidentiality mean?
Definition
Preventing unauthorized access to sensitive or critical data
Term
In reference to the Information Security Triad, What are the two sections of integrity?
Definition
Data Integrity and System Integrity
Term
In reference to the Information Security Triad, What does Data Integrity mean?
Definition
Data in the system is accurate
Term
In reference to the Information Security Triad, What does System Integrity mean?
Definition
That the system performs exactly as intended
Term
In reference to the Information Security Triad, What does Availability mean?
Definition
Access control mechanisms must not prevent information and resources from being available to authorized users.
Term
As it relates to Access Control, what does security refer to?
Definition
Ensure only authorized people or processes are granted access
Term
As it relates to Access Control, what does reliability refer to?
Definition
Assurance that the control functions as expected every time
Term
As it relates to Access Control, what does transparency refer to?
Definition
The controls should have minimum impact on authorized users
Term
As it relates to Access Control, what does scalability refer to?
Definition
Access controls should be able to handle a wide range of changing systems
Term
As it relates to Access Control, what does maintainability refer to?
Definition
Access control solutions must be maintainable to be effective
Term
What is the key concept behind separation of duties?
Definition
No one person should have complete control over the processing of a transaction
Term
As it relates to Access Control, what does integrity refer to?
Definition
Systems must be designed to protect subjects, objects, and permissions from unauthorized changes
Term
What does the concept of Least Privilege mean?
Definition
People or processes should only be allowed access to the resources they absolutely need to accomplish their assigned work
Term
What does the Need to Know Principle mean?
Definition
Restricting users from accessing information not required to do their job, even if they have the proper level of clearance.
Term
What does Information Classification refer to?
Definition
The proper assessment of the sensitivity and criticality of a given piece of information
Term
What is Compartmentalized Information?
Definition
Information that requires special authorization beyond the normal classification.
Term
What are the three types of Access Control?
Definition
Administrative, Technical/Logical, and Physical
Term
What are the categories of Access Control?
Definition
Preventative, Detective, Corrective, Directive, Deterrent, Recovery, Compensating
Term
What does Identification mean?
Definition
The means by which the user provides a claimed identity to the system
Term
What are the three methods of authentication?
Definition
Knowledge, Ownership, and Characteristics
Term
What is an Asynchronous Token Device?
Definition
A device using a numeric keyboard for challenge-response technology
Term
What are the two types of synchronous tokens?
Definition
Event Based Synchronization, and Time-based synchronization
Term
How do contactless smart cards work?
Definition
They contain an embedded radio frequency tranciever
Term
What do physiological biometrics measure?
Definition
Features
Term
When dealing with Biometric Accuracy, what do we call the intersection between the False Acceptance Rate and the False Rejection Rate?
Definition
Crossover Error Rate
Term
What are the Identity Management Challenges?
Definition
Consistency, Reliability, Usability, Efficiency, and Scalability
Term
What type of encryption does Kerberos use?
Definition
Symmetric Key Encryption
Term
What do we call the combination of both an Authentication Server and a Ticket Granting Server in a Kerberos deployment?
Definition
Key Distribution Server
Term
SESAME is an extension of what other technology?
Definition
Kerberos
Term
What type of key does SESAME use?
Definition
Both symmetric and assymetric
Term
Which Model does Hierarchical Domain control follow?
Definition
Bell Lapdula
Term
What does Service Provisioning Markup Service do?
Definition
Provides an XML based framework for managing the allocation of system resources within and between organizations
Term
Restricting access to objects based on the sensitivity of the information and the formal authorization of subjects to access such sensitivity is known as what?
Definition
Mandatory Access Control
Term
Configuring the system to only allow access to certain information during specific times is known as _____________.
Definition
Temporal Isolation
Term
When using a Discretionary Access Control system, who assigns access?
Definition
The information owner
Term
What does the information owner provide in the Mandatory Access Control system?
Definition
The "need to know" element
Term
A ________ access control policy bases access control authorizations on the user's job functions.
Definition
Role-Based
Term
What is a current example of rule based access control?
Definition
Firewalls
Term
________ access control is based on the actual content of the data record.
Definition
Content-dependent
Term
What is the most common type of Discretionary Access Control?
Definition
Access Control Lists
Term
A _________ is a collection of access control lists implemented by comparing the column of objects with the rows of subjects.
Definition
Subject Oriented Capability Table
Term
In __________ access control, access rules are closely managed by the security administrator.
Definition
Non-discretionary
Term
What type of access control do most Operating Systems use?
Definition
Non-discretionary
Term
What type of analysis engine compares current activity with normal activity?
Definition
Anomoly-based
Term
What is an audit trail?
Definition
A record of system activities
Term
__________ consists of a formal set of steps and procedures similar to what an attacker would use to compromise a network.
Definition
Penetration test
Term
What are the three attack strategies used in penetration testing?
Definition
Black Box, partial knowledge and white box
Term
What are the three types of access control?
Definition
Administrative, technical, and physical
Term
Separation of duties forces collusion to commit fraud. Collusion can best be broken up by ____________.
Definition
Rotation of duties
Term
What is the main benefit of an information classification system?
Definition
To give data the appropriate level of protection
Term
What is an authoritative system of records?
Definition
A hierarchical parent system that tracks users, accounts, and authorization chains
Term
What does TEMPEST do?
Definition
Controls emanations from electronic equipment
Term
In Mandatory Access Control, who determines the need to know?
Definition
Information Owner
Term
In content dependent access control, what is the key element that determines the effective access authorization?
Definition
Arbiter Program
Term
An alternate control used when another fails is called a ____________.
Definition
Compensating Control
Term
How could an attacker use an IPS to help create a Denial of Service?
Definition
By generating a false attack that causes the IPS to block legitimate traffic
Term
How can attackers exploit password security guidelines to their advantage?
Definition
By intentionally entering incorrect passwords to lock out user accounts
Term
Why are passphrases considered more secure than passwords?
Definition
Because passphrases are longer
Term
Which error rate of the biometric error rates is by far the more serious?
Definition
False Acceptance Rate
Term
What does the hierarchical domain relationship mean?
Definition
Subjects are allowed to access objects at or lower than their access level
Supporting users have an ad free experience!