Shared Flashcard Set

Details

Domain 2 - ISC2
CISSP - Access Control Systems
86
Computer Science
Professional
07/06/2011

Additional Computer Science Flashcards

 


 

Cards

Term
Preventative Controls
Definition
Controls that prevent harmful occurrence
Term
Detective Controls
Definition
Controls that detect after harmful occurrence
Term
Corrective Controls
Definition
Controls that restore after harmful occurrence
Term
Administrative Controls
Definition
polices and procedures
Term
Logical or Technical Controls
Definition
Controls that restrict access
Term
Physical Controls
Definition
Controls that prevent entry
Term
Mandatory access control (MAC)
Definition
Authorization of subject’s access to an object depends on labels (sensitivity levels), which indicate subject’s clearance, and the classification or sensitivity of the object. Rule based Access Control
Term
Discretionary Access Control (DAC)
Definition
Subject has authority, within certain limits, to specify what objects can be accessible (e.g., use of ACL). Identity Based Access Control
Term
Non-Discretionary Access Control
Definition
Central authority determines what subjects can have access to certain objects based on organization’s security policy (good for high turnover). Roles-Based Access Control or a Lattice-Based Access Control
Term
Identification
Definition
Establishes accountability
Term
Three Factor Authentication
Definition
- Something you know (password)
- Something you have (token)
- Something you are (biometrics)
- Sometimes - something you do
Term
Static Password
Definition
Same each time
Term
Dynamic Password
Definition
Changes each time you login
Term
Preventative Physical Controls
Definition
Restrict physical access, guards, man trap, gates
Term
Detective Phyiscal Controls
Definition
Motion detectors, cameras, thermal detectors
Term
Preventative Technical Controls
Definition
Logical system controls, smart cards, bio-metrics, menu shell
Term
Detective Technical Controls
Definition
IDS, logging, monitoring, clipping levels
Term
Preventative Administrative Controls
Definition
Policies and procedures, pre-employment background checks, strict hiring practices, employment agreements, friendly and unfriendly employee termination procedures, vacation scheduling, labeling of sensitive materials, increased supervision, security awareness training, behavior awareness, and sign-up procedures to obtain access to information systems and networks.
Term
Detective Adminstrative Controls
Definition
Polices and procedures, job rotation, sharing of responsibilities
Term
Synchronous Dynamic Password
Definition
- Token – generates passcode value
- Pin – user knows
- Token and Pin entered into PC
- Must fit in valid time window
Term
Challenge Response
Definition
- System generates challenge string
- User enters into token
- Token generates response entered into workstation
- Mechanism in the workstation determines authentication
Term
False Rejection Rate (FRR)
Definition
Type I error
Term
False Acceptance Rate (FAR)
Definition
Type II error
Term
Crossover Error Rate – (CER)
Definition
% when FRR = FAR
Term
Fingerprints
Definition
Are made up of ridge endings and bifurcations exhibited by the friction ridges and other detailed characteristics that are called minutiae.
Term
Retina Scans
Definition
Scans the blood-vessel pattern of the retina on the backside of the eyeball.
Term
Iris Scans
Definition
Scan the colored portion of the eye that surrounds the pupil
Term
Facial Scans
Definition
Takes attributes and characteristics like bone structures, nose ridges, eye widths, forehead sizes and chin shapes into account.
Term
Palm Scans
Definition
The palm has creases, ridges and grooves throughout it that are unique to a specific person.
Term
Hand Geometry
Definition
The shape of a person’s hand (the length and width of the hand and fingers) measures hand geometry
Term
Voice Print
Definition
Distinguishing differences in people’s speech sounds and patterns.
Term
Signature Dynamics
Definition
Electrical signals of speed and time that can be captured when a person writes a signature.
Term
Keyboard Dynamics
Definition
Captures the electrical signals when a person types a certain phrase.
Term
Hand Topology
Definition
Looks at the size and width of an individual’s hand and fingers.
Term
Kerberos Characteristics
Definition
- Symmetric key encryption
- KDC – Key Distribution Center; has copies of user account credentials
- TGS – Ticket Granting Service; grants session tickets
- AS – Authentication Server; authenticates the user to the KDC
-Network servers treat KDC as trusted third party
Term
Key Distribution Center
Definition
Knows secret keys of Client and Server and exchanges info with the Client and the Server using symmetric keys
Term
Ticket Granting Service
Definition
Sends Client back ticket for server and authenticator for server. Grants temporary symmetric key
Term
Biometrics Types
Definition
- Fingerprints
- Retina Scans
- Iris Scans
- Facial Scans
- Palm Scans
- Hand Geometry
- Voice Print
- Signature Dynamics
- Keyboard Dynamics
- Hand Topology
Term
SESAME
Definition
Secure European System for Applications in a Multi-vendor Environment
- Uses Needham-Schroeder protocol
- Uses public key cryptography
- Supports MD5 and CRC32 Hashing
- Uses two tickets
1) One contains authentication
2) One contains the access rights to the client
Term
RADIUS
Definition
Remote Access Dial-In User Service; incorporates an Authentication Server and dynamic password
Term
TACACS
Definition
Terminal Access Controller Access Control System; for network applications, UNIX based uses a static pwd
Term
TACACS+
Definition
Terminal Access Controller Access Control System Plus, supports token authentication
Term
CHAP
Definition
Challenge Handshake Authentication Protocol; supports encryption, protects password
Term
Persistency
Definition
Preservation of integrity through the use of nonvolatile storage media
Term
Primary Key
Definition
Unambiguously identifies a record. Points to a record (tuple)
Term
Cardinality
Definition
# of rows in a relationship (table)
Term
Degree
Definition
# of columns in a relationship (table)
Term
Candidate key
Definition
Any identifier that is a unique to the record
Term
Foreign Key
Definition
Any value that matches the primary key of another relation (table)
Term
Relational Database Operations
Definition
- Select – based on criteria i.e. all items with value > $300.00
- Join - join tables based on a common value
- Union – forms a new relation (table) from two other relations
- View – (virtual table) uses join, project, select - Views can be used to restrict access (least privileges)
- Query plan
1) Comprised of implementation procedures, lowest cost plan based on “cost”
2)Costs are CPU time, Disk Access
3)Bind – used to create plan
Term
Data Normalization
Definition
Ensures that attributes in a table rely only on the primary key
- Eliminates repeating groups
- Eliminates redundant data
- Eliminates attributes not dependent on the primary key
Term
Structured Query Language Commands
Definition
- Select
- Update
- Delete
- Insert
- Grant – Access Privileges
- Revoke – Access Privileges
Term
Network Based IDS
Definition
Real time and passive
Term
Host Based IDS
Definition
Uses system and event logs and is limited by log capabilities
Term
Signature Based – (Knowledge Based) IDS
Definition
- Signatures of an attack are stored and referenced
- Failure to recognize slow attacks
- Must have signature stored to identify
Term
Statistical Anomaly Based (Behavior Based) IDS
Definition
Determines “normal” usage profile using statistical samples and detects anomaly from the normal profile
Term
Scanning Tools
Definition
-Nessus
-Nmap
-Security Admin Integrted Network Tool (SAINT)
-Security Admin Tool for Analyzing Networks (SATAN)
Term
Systems Scanning
Definition
Process of probing network for open ports, security holes and general system weaknesses
Term
Kerberos
Definition
-A centralized network authentication serivce
-Developed by MIT in mid 1980s
Term
Kerberos Benefits
Definition
-One time authentication for mulitple network services
-Strong cryptographic implementation using DES and RC4
-Two way authentication capability
Term
Password Authentication Protocol (PAP)
Definition
Users sends ID and password in cleartext to authentication server
Term
Remote Procedure Call (RPC)
Definition
Server authenticates client before executing remote operation; uses public key encryption (PKE) for tranmissions
Term
Relational database
Definition
Used for Decentralized/Distributed Access Contol. Ensures integrity through persistency
Term
Network Information Service
Definition
Used for Decentralzied/Distributed Access Control. Password and file sharing using a distributed database over a network
Term
Security Domain
Definition
Resources organized under protected address space with same management and information security policy
Term
Mandatory Access Control (MAC)
Definition
Restrictive access model based on sensitivity levels; enforced by the O/S and can be difficult to implement
Term
Discretionary Access Control (DAC)
Definition
Allows data owner control over access; uses ACL, O/S enforces ACLs, most commonly used
Term
Rule Based Access Control (RBAC)
Definition
Predefinied ACLs determine access; most commonly used with firewalls, administrators determine rules or conditions of access
Term
Role Base Access Control (RBAC)
Definition
Access based on user's specific role in organization, also known as Non-Discrentionary Access Control. User can only be assigned one role.
Term
Identifiation and Authenication
Definition
Used to protect systems from unauthorized users proving the identity of a user or system
Term
Mechanisms for Identification and Authentication
Definition
-username/password
-tokens
-biometrics
-kerberos
Term
Software Exploitation
Definition
Attacks launched against applications exploiting known flaws and vulnerabilities
Term
Torjan Horses
Definition
Malicious program or piece of code disguised as, or embedded in legitimatel software
Term
Logic Bombs
Definition
Malicious code inserted into a legitimate application; launches when specific conditions are met
Term
Denial of Service(DoS)/Distributed Denial of Service(DDoS)
Definition
-Disrupts legitimate use of services
-Commonly accomplished by buffer overflow
-Blocks communications with TCP sessions overloads
-DDoS intensifies the DoS activity by using multiple systems
Term
Back Door Attack
Definition
-Access without secuirty checks
-Initially intended for S/W developers access for debugging
-Intruders exploit those that have not been closed or create their own
Term
IP Spoofing
Definition
-Creates IP packets with a forged source IP address
-attempts to setup connection using IP address of trusted source
-Connection may allow an attacker access to the target without authenticating
Term
Man in the Middle Attack (MITM)
Definition
Attacker intercepts traffic and has both originating parties believe they are communicating with each other; common in Telnet and Wireless
Term
MITM Tools
Definition
-Juggernaut
-T-Sight
-Hunt
Term
Replay Attack
Definition
Information is extracted from packets captured over the network by attackers and 'replayed" later
Term
TCP/IP Hijacking
Definition
Intruder takes control of legitimate TCP/IP session by spoofing the source address; spoofed packet in inserted into victims communication stream redirecting session to rogue client
Term
Social enginneering
Definition
Manipulating legitimate users into revealing sensitive information; usually done by stressing urgency or seemingly harmless assistance
Term
Password Guessing
Definition
Attacking an account in attempt to discover valid password
Term
Brute Force Attack
Definition
Repeating trying password combinations
Term
Dictionary Attack
Definition
Tries every word in a dictionary
Term
Shoulder Surfing
Definition
Looking over a user's shoulder in attempt to learn their password
Supporting users have an ad free experience!