Access Control and CIA Triangle Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which category of controls includes policies, procedures, and guidelines aligned with security goals?

  • Technical controls
  • Logical controls
  • Physical controls
  • Administrative controls (correct)

Which type of control actively blocks unauthorized actions before they occur?

  • Recovery controls
  • Detective controls
  • Corrective controls
  • Preventive controls (correct)

What type of control identifies and alerts on unauthorized activities as they happen?

  • Deterrent controls
  • Recovering controls
  • Preventive controls
  • Detective controls (correct)

What does the term 'corrective controls' refer to in cybersecurity?

<p>Controls that fix vulnerabilities post-incident (B)</p> Signup and view all the answers

What type of asset is characterized as having a physical form that can be touched?

<p>Tangible assets (C)</p> Signup and view all the answers

Which state of data occurs when it is actively being processed by a system?

<p>In-use (D)</p> Signup and view all the answers

Which element does the countermeasure dimension in the cybersecurity cube include?

<p>Data protection (A)</p> Signup and view all the answers

What describes an event that violates security unintentionally?

<p>Accidental breach (A)</p> Signup and view all the answers

What method of access control is primarily based on job titles?

<p>Role-Based Access Control (RBAC) (A)</p> Signup and view all the answers

Which of the following is an example of Rule-Based Access Control (RAC)?

<p>Permitting students to access labs only at certain times. (C)</p> Signup and view all the answers

What is the equation used to calculate Annualized Loss Expectancy (ALE)?

<p>ALE = SLE x ARO (A)</p> Signup and view all the answers

What does the Qualitative Method of Risk Assessment rely on?

<p>Expert judgment and subjective ranking. (C)</p> Signup and view all the answers

Which risk response strategy involves eliminating the risk altogether?

<p>Risk Avoidance (C)</p> Signup and view all the answers

What is the primary goal of Risk Mitigation?

<p>To reduce the impact of risks on a project. (D)</p> Signup and view all the answers

In Risk Management, what are the two key steps in Risk Assessment?

<p>Identify assets and risk analysis (D)</p> Signup and view all the answers

What does Risk Transfer aim to achieve?

<p>Sharing responsibility for the risk. (B)</p> Signup and view all the answers

What principle does non-repudiation ensure in a security context?

<p>An individual cannot deny having performed a particular action. (A)</p> Signup and view all the answers

Which access control model is based solely on the owner of the data determining access rights?

<p>Discretionary Access Control (DAC) (A)</p> Signup and view all the answers

Which model evaluates user access based on the historical behavior of the user?

<p>History-Based Access Control (HBAC) (B)</p> Signup and view all the answers

What does the availability aspect of the CIA Triangle refer to?

<p>Making sure that authorized users have access to information and resources when needed. (A)</p> Signup and view all the answers

In access control, what is the primary function of authentication?

<p>To verify the identity of a user. (A)</p> Signup and view all the answers

What does the principle of audit in access control allow organizations to do?

<p>Collect data about user activities and detect violations. (C)</p> Signup and view all the answers

Which of the following access control models relies on attributes of users and environmental conditions?

<p>Attribute-Based Access Control (ABAC) (C)</p> Signup and view all the answers

Security Enhanced Linux implements which type of access control model?

<p>Mandatory Access Control (MAC) (D)</p> Signup and view all the answers

Flashcards

RBAC

Role-Based Access Control; access is granted based on job title or role, not individual discretion.

RAC

Rule-Based Access Control; access is based on specific contextual rules, like when and where.

Risk Assessment

Process of determining potential risks, ranking them based on the probability and impact.

Risk Management

Steps to identify, assess, mitigate, and monitor potential risks.

Signup and view all the flashcards

ALE

Annualized Loss Expectancy; measures the expected monetary loss from a risk over a year.

Signup and view all the flashcards

SLE

Single Loss Expectancy; estimates the monetary loss from a single risk event.

Signup and view all the flashcards

Risk Mitigation

Actions taken to reduce the impact of negative risks.

Signup and view all the flashcards

Qualitative Risk Assessment

Ranking risks based on expert judgment using scales (e.g., high, medium, low).

Signup and view all the flashcards

CIA Triangle

A model of information security goals: Confidentiality, Integrity, and Availability.

Signup and view all the flashcards

Non-Repudiation

A security principle preventing someone from denying a particular action.

Signup and view all the flashcards

Authentication

Process of verifying a user's identity.

Signup and view all the flashcards

Authorization

Determining what a verified user can access or do.

Signup and view all the flashcards

Attribute-Based Access Control (ABAC)

Access control based on evaluating a set of rules, policies and relationships using attributes of users, systems and environmental conditions.

Signup and view all the flashcards

Discretionary Access Control (DAC)

Access control where data owners decide who can access resources, based mainly on user ID and ownership.

Signup and view all the flashcards

Mandatory Access Control (MAC)

Access control regulated by a central authority based on security levels.

Signup and view all the flashcards

History-Based Access Control (HBAC)

Access control based on user activity history; previous actions affect future permissions.

Signup and view all the flashcards

Control Categories in Cybersecurity

Administrative (Management), Physical (Operational), and Logical (Technical) controls are different ways to protect systems and data.

Signup and view all the flashcards

Control Types (Cybersecurity)

Deterrent, Preventive, Detective, Recovery, and Corrective controls each address different parts of the security process.

Signup and view all the flashcards

Security Governance Elements

Policies, Procedures, Standards, and Guidelines are crucial for a well-run cybersecurity program.

Signup and view all the flashcards

Cybersecurity Assets

Tangible and intangible resources that need protection are considered cybersecurity assets.

Signup and view all the flashcards

Intrusion Detection System (IDS)

A system that detects suspicious or unauthorized activity.

Signup and view all the flashcards

Intrusion Prevention System (IPS)

A system that proactively blocks or eliminates unauthorized actions.

Signup and view all the flashcards

Cybersecurity incidents

Unintentional or intentional events that violate security.

Signup and view all the flashcards

Cybersecurity Cube Dimensions

Countermeasures, Control levels, and Assets are dimensions of the cybersecurity cube.

Signup and view all the flashcards

Study Notes

CIA Triangle

  • Confidentiality: Ensures an individual or entity cannot deny performing an action.
  • Integrity: Non-repudiation ensures an individual or entity cannot deny having performed a particular action.
  • Availability: Ensures resources are accessible when needed.

Access Control Components

  • Authentication: Verifying a user's identity.
  • Authorization: Determining the extent of access to resources and type of services.
  • Access: Successful authentication and authorization allows verified users to access resources.
  • Audit: Organizations use audits to collect data on user activities and analyze potential access violations.
  • Management: Organizations manage access control systems by adding and removing authentication/authorization for users and systems.

Access Control Models

  • Attribute-Based Access Control (ABAC): Access is granted/denied by evaluating rules, policies, and relationships based on user, system, and environmental attributes.

Discretionary Access Control (DAC)

  • Data owners determine access to resources based on user ID and ownership.
  • Less secure than other models.

History-Based Access Control (HBAC)

  • Access is granted/denied based on user history, activities, and request content.
  • Examines patterns of behavior over time to mitigate risk.

Mandatory Access Control (MAC)

  • Access rights are regulated by a central authority based on multiple security levels.
  • Security Enhanced Linux (SELinux) is an example of MAC implementation.

Identity-Based Access Control (IBAC)

  • Network administrators can manage activity and access based on individual requirements.

Organization-Based Access Control (OrBAC)

  • Allows the policy designer to set security policies independently of the implementation.
  • Manages permissions for organizational parts.

Role-Based Access Control (RBAC)

  • Access is based on job title.
  • Eliminates discretion in granting access.

Risk Management

  • Risk = Event Probability of Occurrence x Event Impact
  • Risk Assessment: Determine assets, perform risk analysis.
  • Risk Control: Implement risk mitigation strategies, monitor risks.
  • Qualitative Risk Assessment: Ranks risks subjectively (high, medium, low).
  • Quantitative Risk Assessment: Uses numerical data to estimate risk probability and financial impact (ALE = SLE x ARO).

Risk Response Strategies

  • Accept: Acknowledge and prepare for consequences.
  • Mitigate: Reduce negative impact through safeguards and controls.
  • Transfer: Shift risk to a third party.
  • Avoid: Eliminate the risk by changing processes or behaviors.

Control Categories

  • Administrative (Management): Policies, procedures, guidelines defining personnel and business practices.
  • Physical (Operational): Measures to prevent unauthorized access to sensitive material (e.g., alarms, guards).
  • Logical (Technical): Technology-based controls to reduce vulnerabilities in hardware and software (e.g., antivirus, firewalls).

Control Types

  • Deterrent: Discourages malicious activities (e.g., security policies).
  • Preventive: Stops security incidents before they occur (e.g., Intrusion Prevention Systems).
  • Detective: Identifies security incidents after they occur (e.g., Intrusion Detection Systems).
  • Recovery: Restores systems and data after an incident.
  • Corrective: Fixes vulnerabilities.

Security Governance

  • Policies, Procedures, Standards, Guidelines: Key elements of security governance.
  • Assets: Tangible and intangible resources.

Security Quiz Questions

  • Cybersecurity framework development, hacking process without permission, data states, cyber security cube, data storage, countermeasure dimension (involving network availability), and more are included among the questions.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser