Podcast
Questions and Answers
What is the primary purpose of identification in access control?
What is the primary purpose of identification in access control?
The primary purpose of identification is to validate and verify an unauthenticated entity's purported identity.
List the three main factors of authentication.
List the three main factors of authentication.
The three main factors of authentication are something you know, something you have, and something you are.
How does authorization differ from authentication?
How does authorization differ from authentication?
Authorization determines access levels for an authenticated entity, while authentication verifies the identity of a user.
What are authorization credentials, and what is their purpose?
What are authorization credentials, and what is their purpose?
Signup and view all the answers
Explain what a composite identifier is.
Explain what a composite identifier is.
Signup and view all the answers
What are the three methods of handling authorization mentioned?
What are the three methods of handling authorization mentioned?
Signup and view all the answers
What role does the authenticator play in the authorization process?
What role does the authenticator play in the authorization process?
Signup and view all the answers
Which source address allows outbound traffic according to Rule #1?
Which source address allows outbound traffic according to Rule #1?
Signup and view all the answers
What action is taken for any traffic from the source address 10.10.10.1 based on the rules?
What action is taken for any traffic from the source address 10.10.10.1 based on the rules?
Signup and view all the answers
Identify the rule that allows traffic from the source address 10.10.10.0.
Identify the rule that allows traffic from the source address 10.10.10.0.
Signup and view all the answers
What is the default action for outbound traffic not explicitly stated in the rules?
What is the default action for outbound traffic not explicitly stated in the rules?
Signup and view all the answers
Explain the purpose of Rule #2 in the outbound interface rule set.
Explain the purpose of Rule #2 in the outbound interface rule set.
Signup and view all the answers
Which biometric method has the highest universality?
Which biometric method has the highest universality?
Signup and view all the answers
Identify a biometric method with low uniqueness.
Identify a biometric method with low uniqueness.
Signup and view all the answers
Which biometric method is ranked highest in permanence?
Which biometric method is ranked highest in permanence?
Signup and view all the answers
What is the performance ranking of hand geometry?
What is the performance ranking of hand geometry?
Signup and view all the answers
Which biometric method has medium acceptability?
Which biometric method has medium acceptability?
Signup and view all the answers
How does the circumvention ranking compare between eye retina and iris recognition?
How does the circumvention ranking compare between eye retina and iris recognition?
Signup and view all the answers
Which biometric method is noted for having high collectability?
Which biometric method is noted for having high collectability?
Signup and view all the answers
Rank the uniqueness of hand geometry.
Rank the uniqueness of hand geometry.
Signup and view all the answers
Which biometric has the lowest performance rating?
Which biometric has the lowest performance rating?
Signup and view all the answers
What is the performance of eye iris recognition?
What is the performance of eye iris recognition?
Signup and view all the answers
What is accountability in the context of information security?
What is accountability in the context of information security?
Signup and view all the answers
How do system logs contribute to accountability?
How do system logs contribute to accountability?
Signup and view all the answers
What are the main characteristics evaluated in biometric systems?
What are the main characteristics evaluated in biometric systems?
Signup and view all the answers
Why are only certain traits considered truly unique in biometrics?
Why are only certain traits considered truly unique in biometrics?
Signup and view all the answers
What is a common criticism of highly reliable biometric systems?
What is a common criticism of highly reliable biometric systems?
Signup and view all the answers
What does auditability ensure in information security?
What does auditability ensure in information security?
Signup and view all the answers
In what ways are system logs utilized apart from accountability?
In what ways are system logs utilized apart from accountability?
Signup and view all the answers
What is the importance of the crossover error rate in biometric systems?
What is the importance of the crossover error rate in biometric systems?
Signup and view all the answers
How are actions tracked in a secure system?
How are actions tracked in a secure system?
Signup and view all the answers
What is the primary focus of the Clark-Wilson Integrity Model?
What is the primary focus of the Clark-Wilson Integrity Model?
Signup and view all the answers
Describe the composition of the Graham-Denning Access Control Model.
Describe the composition of the Graham-Denning Access Control Model.
Signup and view all the answers
What is the main purpose of the Harrison-Ruzzo-Ullman Model?
What is the main purpose of the Harrison-Ruzzo-Ullman Model?
Signup and view all the answers
Explain the Brewer-Nash Model and its relevance.
Explain the Brewer-Nash Model and its relevance.
Signup and view all the answers
What constitutes a firewall in information security?
What constitutes a firewall in information security?
Signup and view all the answers
List and describe the key processing modes of firewalls.
List and describe the key processing modes of firewalls.
Signup and view all the answers
What kind of information do packet-filtering firewalls examine?
What kind of information do packet-filtering firewalls examine?
Signup and view all the answers
How do packet-filtering firewalls differentiate between inbound and outbound traffic?
How do packet-filtering firewalls differentiate between inbound and outbound traffic?
Signup and view all the answers
What role do MAC layer firewalls play in network security?
What role do MAC layer firewalls play in network security?
Signup and view all the answers
What are some examples of device configurations for firewalls?
What are some examples of device configurations for firewalls?
Signup and view all the answers
Study Notes
Module 6: Security Technology: Access Controls, Firewalls, and VPNs
- Access control is a selective method for systems to specify who can use a resource and how.
- Technical controls are essential in enforcing policy for IT functions not directly managed by humans.
- Well-implemented technical controls improve balance between accessibility and confidentiality/integrity.
- Access controls focus on permissions/privileges for subjects (users/systems) on objects (resources).
- Access control includes consideration of when, how, and from where a subject can access an object, and the ways a subject uses it.
- Mandatory Access Controls (MACs) require structured data classification schemes that prioritize each information collection and user.
- Discretionary Access Controls (DACs) are implemented at the discretion of the data user.
- Nondiscretionary controls are implemented by a central authority.
Access Control Approaches
- Access control relies on four mechanisms:
- Identification: user claiming an identity
- Authentication: proving user identity
- Authorization: defining allowable actions with the system
- Accountability: tracking and monitoring user actions
Identification
- Identification validates and verifies an unauthenticated entity.
- Identifiers can be composite, combining elements like department codes, random numbers, or special characters, for uniqueness.
- Most organizations use a single, unique identifier like a full name or initials and surname.
Authentication
- Authentication validates and verifies claimed identity.
- Authentication factors include:
- Something you know (DOB, place of birth, SSN, password)
- Something you have (token, physical key)
- Something you are (biometrics)
Authorization
- Authorization matches an authenticated entity to a list of assets and their access levels
- Authorization can be handled by:
- Individual user
- User group
- Multiple systems
Accountability
- Accountability (auditability) ensures actions are assigned to a verified identity.
- This is usually accomplished through system logs and database journals.
- Logs record, and log entries have multi-purposes.
- Logs, system/database journals can and are commonly used as audit trails.
Biometrics
- Biometrics authenticate identity using measurable human traits.
- Accurate biometrics include fingerprints, retina, iris, and DNA.
- Biometric systems are often evaluated by false rejection rate, false acceptance rate, and crossover error rate.
- Some users find highly reliable biometric systems intrusive.
Firewall Technologies
- A firewall is a combination of hardware and software that controls information flow between trusted and untrusted networks.
- A firewall might:
- Separate computer system
- Utilize software on existing router/server
- Utilize separate network with supporting devices
Firewalls Processing Modes
- Firewalls use various processing modes:
- Packet filtering through data packet headers
- Application-layer proxy through higher layer protocols (and cache services)
- MAC layer firewalls using MAC addresses
- Hybrid models using several criteria
Packet-Filtering Firewalls
- Packet-filtering firewalls examine packet header information based on several criteria, such as:
- IP source and destination addresses
- Direction (inbound or outbound)
- TCP/UDP port numbers
- Simple models enforce rules blocking packets based on their addresses.
Access Control Architecture Models
- Models like TCSEC's Trusted Computing Base (TCB), used in pre-2005 DoD Rainbow Series security policy enforcement, help quickly implement or adapt access control strategies.
- Challenges of covert channels, storage channels, and timing channels must be considered.
- Other models, like ITSEC (International Standards for evaluating computer security), the Common Criteria (considered successor to TCSEC and ITSEC), Bell-LaPadula, Biba Integrity Model, Clark-Wilson, Graham-Denning, and Harrison-Ruzzo-Ullman are security models, or access control schemes having unique purposes.
Firewall Architectures
- Firewalls can be configured in several arrangements, including single bastion hosts, screened hosts, and screened subnets(with DMZs).
- Architectural decisions should consider network objectives, organizational capabilities, and available budget.
VPNs
- Virtual Private Networks (VPNs) create a private communication pathway between networked systems.
- Securely accessing internal network resources from remote locations via VPNs.
- VPN implementations exist via Trusted, Secure, and/or Hybrid VPNs.
VPN Functionality
- VPNs use encryption, encapsulation, and authentication functions to create secure connections.
- VPNs use mechanisms such as encapsulation, encryption, authentication to turn public network into private networks
- Common types of VPNs include transport mode VPNs and tunnel mode VPNs.
Content Filters
- Content filters are software programs or appliances that restrict content entering or leaving a network.
- Content filters focus on scripts or programs that limit access to specific protocols/internet locations.
- Content Filters mainly used for internal access restriction to external materials and preventing/filtering incoming spam.
Additional Information regarding Specific Topics
- Knowledge check activity questions for firewalls/access control
- Various Firewall Rule Sets are included (Rule Set 1 - Rule Set 8).
- Well-known Port Numbers are listed
- External/Internal Filtering Firewall Rule Sets
- Access Control Considerations with COVID-19
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential concepts related to access control, authentication, and authorization. It includes questions on the factors of authentication, types of authorization credentials, and various biometric methods used in security. Test your knowledge of these foundational topics in security management.