Podcast
Questions and Answers
What is the primary purpose of identification in access control?
What is the primary purpose of identification in access control?
The primary purpose of identification is to validate and verify an unauthenticated entity's purported identity.
List the three main factors of authentication.
List the three main factors of authentication.
The three main factors of authentication are something you know, something you have, and something you are.
How does authorization differ from authentication?
How does authorization differ from authentication?
Authorization determines access levels for an authenticated entity, while authentication verifies the identity of a user.
What are authorization credentials, and what is their purpose?
What are authorization credentials, and what is their purpose?
Explain what a composite identifier is.
Explain what a composite identifier is.
What are the three methods of handling authorization mentioned?
What are the three methods of handling authorization mentioned?
What role does the authenticator play in the authorization process?
What role does the authenticator play in the authorization process?
Which source address allows outbound traffic according to Rule #1?
Which source address allows outbound traffic according to Rule #1?
What action is taken for any traffic from the source address 10.10.10.1 based on the rules?
What action is taken for any traffic from the source address 10.10.10.1 based on the rules?
Identify the rule that allows traffic from the source address 10.10.10.0.
Identify the rule that allows traffic from the source address 10.10.10.0.
What is the default action for outbound traffic not explicitly stated in the rules?
What is the default action for outbound traffic not explicitly stated in the rules?
Explain the purpose of Rule #2 in the outbound interface rule set.
Explain the purpose of Rule #2 in the outbound interface rule set.
Which biometric method has the highest universality?
Which biometric method has the highest universality?
Identify a biometric method with low uniqueness.
Identify a biometric method with low uniqueness.
Which biometric method is ranked highest in permanence?
Which biometric method is ranked highest in permanence?
What is the performance ranking of hand geometry?
What is the performance ranking of hand geometry?
Which biometric method has medium acceptability?
Which biometric method has medium acceptability?
How does the circumvention ranking compare between eye retina and iris recognition?
How does the circumvention ranking compare between eye retina and iris recognition?
Which biometric method is noted for having high collectability?
Which biometric method is noted for having high collectability?
Rank the uniqueness of hand geometry.
Rank the uniqueness of hand geometry.
Which biometric has the lowest performance rating?
Which biometric has the lowest performance rating?
What is the performance of eye iris recognition?
What is the performance of eye iris recognition?
What is accountability in the context of information security?
What is accountability in the context of information security?
How do system logs contribute to accountability?
How do system logs contribute to accountability?
What are the main characteristics evaluated in biometric systems?
What are the main characteristics evaluated in biometric systems?
Why are only certain traits considered truly unique in biometrics?
Why are only certain traits considered truly unique in biometrics?
What is a common criticism of highly reliable biometric systems?
What is a common criticism of highly reliable biometric systems?
What does auditability ensure in information security?
What does auditability ensure in information security?
In what ways are system logs utilized apart from accountability?
In what ways are system logs utilized apart from accountability?
What is the importance of the crossover error rate in biometric systems?
What is the importance of the crossover error rate in biometric systems?
How are actions tracked in a secure system?
How are actions tracked in a secure system?
What is the primary focus of the Clark-Wilson Integrity Model?
What is the primary focus of the Clark-Wilson Integrity Model?
Describe the composition of the Graham-Denning Access Control Model.
Describe the composition of the Graham-Denning Access Control Model.
What is the main purpose of the Harrison-Ruzzo-Ullman Model?
What is the main purpose of the Harrison-Ruzzo-Ullman Model?
Explain the Brewer-Nash Model and its relevance.
Explain the Brewer-Nash Model and its relevance.
What constitutes a firewall in information security?
What constitutes a firewall in information security?
List and describe the key processing modes of firewalls.
List and describe the key processing modes of firewalls.
What kind of information do packet-filtering firewalls examine?
What kind of information do packet-filtering firewalls examine?
How do packet-filtering firewalls differentiate between inbound and outbound traffic?
How do packet-filtering firewalls differentiate between inbound and outbound traffic?
What role do MAC layer firewalls play in network security?
What role do MAC layer firewalls play in network security?
What are some examples of device configurations for firewalls?
What are some examples of device configurations for firewalls?
Flashcards
Authentication
Authentication
The process of verifying and validating an unauthenticated entity's claimed identity.
Authorization
Authorization
The access control method that determines what resources an authenticated entity can access based on their permissions.
Identifier
Identifier
A unique identifier that distinguishes one entity from another, often a combination of elements like department codes, random numbers, or special characters.
Authentication Factor
Authentication Factor
Signup and view all the flashcards
Authorization Credentials
Authorization Credentials
Signup and view all the flashcards
Identification
Identification
Signup and view all the flashcards
Access Control
Access Control
Signup and view all the flashcards
Universality
Universality
Signup and view all the flashcards
Uniqueness
Uniqueness
Signup and view all the flashcards
Permanence
Permanence
Signup and view all the flashcards
Collectability
Collectability
Signup and view all the flashcards
Performance
Performance
Signup and view all the flashcards
Acceptability
Acceptability
Signup and view all the flashcards
Circumvention
Circumvention
Signup and view all the flashcards
Accountability (Auditability)
Accountability (Auditability)
Signup and view all the flashcards
How is Accountability (Auditability) Achieved?
How is Accountability (Auditability) Achieved?
Signup and view all the flashcards
System Logs
System Logs
Signup and view all the flashcards
Biometrics
Biometrics
Signup and view all the flashcards
False Reject Rate
False Reject Rate
Signup and view all the flashcards
False Accept Rate
False Accept Rate
Signup and view all the flashcards
Crossover Error Rate
Crossover Error Rate
Signup and view all the flashcards
What are considered truly unique biometric traits?
What are considered truly unique biometric traits?
Signup and view all the flashcards
Why are highly reliable biometric systems considered intrusive?
Why are highly reliable biometric systems considered intrusive?
Signup and view all the flashcards
Firewall Rule Processing
Firewall Rule Processing
Signup and view all the flashcards
Firewall Rule Set
Firewall Rule Set
Signup and view all the flashcards
Allow Rule
Allow Rule
Signup and view all the flashcards
Deny Rule
Deny Rule
Signup and view all the flashcards
Default Allow Rule
Default Allow Rule
Signup and view all the flashcards
Clark-Wilson Integrity Model
Clark-Wilson Integrity Model
Signup and view all the flashcards
Graham-Denning Access Control Model
Graham-Denning Access Control Model
Signup and view all the flashcards
Harrison-Ruzzo-Ullman Model
Harrison-Ruzzo-Ullman Model
Signup and view all the flashcards
Brewer-Nash Model (Chinese Wall)
Brewer-Nash Model (Chinese Wall)
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Packet Filtering
Packet Filtering
Signup and view all the flashcards
Application-Layer Proxy
Application-Layer Proxy
Signup and view all the flashcards
MAC Layer Firewall
MAC Layer Firewall
Signup and view all the flashcards
Hybrid Firewall
Hybrid Firewall
Signup and view all the flashcards
Study Notes
Module 6: Security Technology: Access Controls, Firewalls, and VPNs
- Access control is a selective method for systems to specify who can use a resource and how.
- Technical controls are essential in enforcing policy for IT functions not directly managed by humans.
- Well-implemented technical controls improve balance between accessibility and confidentiality/integrity.
- Access controls focus on permissions/privileges for subjects (users/systems) on objects (resources).
- Access control includes consideration of when, how, and from where a subject can access an object, and the ways a subject uses it.
- Mandatory Access Controls (MACs) require structured data classification schemes that prioritize each information collection and user.
- Discretionary Access Controls (DACs) are implemented at the discretion of the data user.
- Nondiscretionary controls are implemented by a central authority.
Access Control Approaches
- Access control relies on four mechanisms:
- Identification: user claiming an identity
- Authentication: proving user identity
- Authorization: defining allowable actions with the system
- Accountability: tracking and monitoring user actions
Identification
- Identification validates and verifies an unauthenticated entity.
- Identifiers can be composite, combining elements like department codes, random numbers, or special characters, for uniqueness.
- Most organizations use a single, unique identifier like a full name or initials and surname.
Authentication
- Authentication validates and verifies claimed identity.
- Authentication factors include:
- Something you know (DOB, place of birth, SSN, password)
- Something you have (token, physical key)
- Something you are (biometrics)
Authorization
- Authorization matches an authenticated entity to a list of assets and their access levels
- Authorization can be handled by:
- Individual user
- User group
- Multiple systems
Accountability
- Accountability (auditability) ensures actions are assigned to a verified identity.
- This is usually accomplished through system logs and database journals.
- Logs record, and log entries have multi-purposes.
- Logs, system/database journals can and are commonly used as audit trails.
Biometrics
- Biometrics authenticate identity using measurable human traits.
- Accurate biometrics include fingerprints, retina, iris, and DNA.
- Biometric systems are often evaluated by false rejection rate, false acceptance rate, and crossover error rate.
- Some users find highly reliable biometric systems intrusive.
Firewall Technologies
- A firewall is a combination of hardware and software that controls information flow between trusted and untrusted networks.
- A firewall might:
- Separate computer system
- Utilize software on existing router/server
- Utilize separate network with supporting devices
Firewalls Processing Modes
- Firewalls use various processing modes:
- Packet filtering through data packet headers
- Application-layer proxy through higher layer protocols (and cache services)
- MAC layer firewalls using MAC addresses
- Hybrid models using several criteria
Packet-Filtering Firewalls
- Packet-filtering firewalls examine packet header information based on several criteria, such as:
- IP source and destination addresses
- Direction (inbound or outbound)
- TCP/UDP port numbers
- Simple models enforce rules blocking packets based on their addresses.
Access Control Architecture Models
- Models like TCSEC's Trusted Computing Base (TCB), used in pre-2005 DoD Rainbow Series security policy enforcement, help quickly implement or adapt access control strategies.
- Challenges of covert channels, storage channels, and timing channels must be considered.
- Other models, like ITSEC (International Standards for evaluating computer security), the Common Criteria (considered successor to TCSEC and ITSEC), Bell-LaPadula, Biba Integrity Model, Clark-Wilson, Graham-Denning, and Harrison-Ruzzo-Ullman are security models, or access control schemes having unique purposes.
Firewall Architectures
- Firewalls can be configured in several arrangements, including single bastion hosts, screened hosts, and screened subnets(with DMZs).
- Architectural decisions should consider network objectives, organizational capabilities, and available budget.
VPNs
- Virtual Private Networks (VPNs) create a private communication pathway between networked systems.
- Securely accessing internal network resources from remote locations via VPNs.
- VPN implementations exist via Trusted, Secure, and/or Hybrid VPNs.
VPN Functionality
- VPNs use encryption, encapsulation, and authentication functions to create secure connections.
- VPNs use mechanisms such as encapsulation, encryption, authentication to turn public network into private networks
- Common types of VPNs include transport mode VPNs and tunnel mode VPNs.
Content Filters
- Content filters are software programs or appliances that restrict content entering or leaving a network.
- Content filters focus on scripts or programs that limit access to specific protocols/internet locations.
- Content Filters mainly used for internal access restriction to external materials and preventing/filtering incoming spam.
Additional Information regarding Specific Topics
- Knowledge check activity questions for firewalls/access control
- Various Firewall Rule Sets are included (Rule Set 1 - Rule Set 8).
- Well-known Port Numbers are listed
- External/Internal Filtering Firewall Rule Sets
- Access Control Considerations with COVID-19
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.