Access Control Concepts
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A ______ is a group of one or more interfaces that have similar functions or features.

zone

Firewalls primarily protect from technical attacks originating from the ______.

outside

All traffic from the trusted network is allowed ______.

out

The ______ device is never directly accessible from the public network.

<p>firewall</p> Signup and view all the answers

Simple Mail Transfer Protocol data is allowed to enter through the firewall but is routed to a well-configured ______ gateway.

<p>SMTP</p> Signup and view all the answers

All Internet Control Message Protocol data should be ______.

<p>denied</p> Signup and view all the answers

Kerberos Ticket Granting Service provides tickets to clients who request ______ services.

<p>requested</p> Signup and view all the answers

All data that is not verifiably ______ should be denied.

<p>authentic</p> Signup and view all the answers

A Demilitarized Zone (DMZ) typically has one interface connected to the ______ network.

<p>private</p> Signup and view all the answers

Traffic originating from the private network is ______ and inspected as it travels toward the public network.

<p>permitted</p> Signup and view all the answers

Traffic coming from the DMZ and traveling to the private network is usually ______.

<p>blocked</p> Signup and view all the answers

Firewalls do not stop intrusions that come from hosts within a ______.

<p>network</p> Signup and view all the answers

Firewalls are no substitute for informed administrators and ______.

<p>users</p> Signup and view all the answers

Positioning firewalls at security ______ is a best practice for enhancing security.

<p>boundaries</p> Signup and view all the answers

Zone-based Policy Firewalls use the concept of ______ to provide additional security.

<p>zones</p> Signup and view all the answers

To improve security, it is important to regularly ______ firewall logs.

<p>monitor</p> Signup and view all the answers

Stateful firewalls track the ______ of network connections.

<p>state</p> Signup and view all the answers

Packet filtering firewalls have limitations, as they cannot inspect the contents of ______.

<p>packets</p> Signup and view all the answers

Firewall architecture can be categorized into two main types: ______ and stateful firewalls.

<p>stateless</p> Signup and view all the answers

A Demilitarized Zone (DMZ) is designed to add an extra layer of ______ to an organization's internal network.

<p>security</p> Signup and view all the answers

Network security considerations include preventing exposure of sensitive ______ to untrusted users.

<p>resources</p> Signup and view all the answers

Firewalls can sanitize flow protocol to prevent the exploitation of ______ flaws.

<p>protocol</p> Signup and view all the answers

Packet filtering firewalls operate based on Layer 3 and Layer ______ information.

<p>4</p> Signup and view all the answers

Firewalls are the only transit point between corporate networks and ______ networks.

<p>external</p> Signup and view all the answers

Study Notes

Access Control

  • Access control is a selective method that defines who can use resources and how. This involves specifying which subjects (users or entities) can access which objects (data or resources).
  • Discretionary access controls allow users to control access rights.
  • Nondiscretionary access controls (implemented by a central authority) specify who can access things, rather than letting the objects' owners decide.
  • Lattice-based access control is a variation of mandatory access controls (requiring a central authority). It uses a matrix of authorizations to specify access.
  • Role-based access control assigns privileges based on the user's job or role.
  • Task-based access control grants privileges based on a user's current task. These privileges are temporary.
  • Mandatory access control uses a structured data classification scheme to define sensitivity levels for different data and users.
  • Attribute-based access control defines access based on user attributes. Attributes are characteristics of a user used to restrict object access.
  • Access control mechanisms include Identification, Authentication, Authorization, and Accountability.

Access Control Mechanisms

  • Identification: The process of determining a user's identity. This usually involves a username or label known to the system.
  • Authentication: Verifying a user's claimed identity. This often uses passwords, smart cards, biometric data (e.g., fingerprints, facial recognition), or other methods.
  • Authorization: Determining and validating what actions an authenticated user is permitted to perform on particular objects.
  • Accountability: Tracking actions taken within the system (both authorized and unauthorized) and linking these actions to the user account who performed the actions.

Access Control Models

  • Trusted Computing Base (TCSEC/Orange Book) and ITSEC are sets of criteria used to evaluate and classify the security of computer systems developed by the US Department of Defense and European standards, respectively.
  • Common Criteria (ISO/IEC 15408) is an international standard for computer security certification.
  • Bell-LaPadula Confidentiality Model is a model focused on maintaining confidentiality in multi-level security systems.
  • Biba Integrity Model focuses on maintaining data integrity.
  • Clark-Wilson Integrity Model ensures data integrity by enforcing properly formed transactions to prevent unauthorized or improper modifications.
  • Graham-Denning Access Control Model specifies how subjects and objects are securely managed within a system.
  • Harrison-Ruzzo-Ullman Model formally specifies how a system controls resource access in a structured and secure manner.

Firewalls

  • Firewalls control access between networks. They enforce policies on network traffic.
  • Common properties include resistance to network attacks, and being the only transit point between networks.
  • Benefits of using firewalls include: protecting sensitive hosts, sanitizing flows, reducing security management.
  • Common types of firewalls include packet filtering, stateful firewalls, application gateways, next-generation firewalls, and host-based firewalls.
  • Packet filtering firewalls permit or deny traffic based on network-layer information.
  • Stateful firewalls add context from previous communication to the decision process.
  • Application gateways filter at the application layer.
  • Limitations include misconfiguration potential, security issues if bypassing, performance impact, and difficulties with more complex attacks.

Layered Defense

  • Layered defense is a security strategy consisting of multiple layers to protect against various threats. Network Core Security, Perimeter Security, Communications Security, and Endpoint Security are different layers.
  • Security measures and considerations that should be taken into account about firewalls.

VPNs

  • Virtual Private Networks (VPNs) provide a secure connection over a public network.
  • Common VPN types include trusted, secure, and hybrid.
  • VPNs use encapsulation, encryption, and authentication to secure communication over public networks.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz covers various methods of access control, defining who can access specific resources and data. It explores discretionary, nondiscretionary, lattice-based, role-based, task-based, mandatory, and attribute-based access controls. Test your understanding of these critical security concepts!

More Like This

Access Control Methods Quiz
12 questions
Remote Access Control Methods
18 questions
Access Control Methods
28 questions

Access Control Methods

RoomierDivisionism avatar
RoomierDivisionism
Use Quizgecko on...
Browser
Browser