Untitled Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of authorization credentials in a centralized system?

  • To allow unlimited access to all system resources
  • To store user information without facilitating access control
  • To verify a user’s identity and assign specific access rights (correct)
  • To enhance user experience by reducing login times

Which of the following best describes accountability in a security context?

  • Ensuring that all actions on a system can be traced back to an authenticated identity (correct)
  • Limiting access control to only trusted users
  • Allowing users to bypass security protocols
  • Implementing security measures without tracking user actions

What is the main function of a reference monitor within a Trusted Computing Base (TCB)?

  • To execute programs without any security checks
  • To store logs of unauthorized access attempts
  • To manage access controls and mediate all access to resources (correct)
  • To enhance system performance by reducing checks

How do covert channels communicate within a computer system?

<p>By using unauthorized methods hidden in system operations (D)</p> Signup and view all the answers

What is the role of system logs in accountability?

<p>They record actions taken by both authorized and unauthorized users for auditing (A)</p> Signup and view all the answers

What does single sign-on (SSO) achieve in terms of user access management?

<p>A unified set of credentials that grants access to multiple systems (B)</p> Signup and view all the answers

Which of the following best describes the trusted computing base (TCB)?

<p>The essential components responsible for enforcing security policies (C)</p> Signup and view all the answers

Which type of access control model utilizes a centralized directory for managing group memberships?

<p>Group-Based Access Control (B)</p> Signup and view all the answers

What is the primary purpose of subject authentication and identification in the Clark-Wilson model?

<p>To ensure that only authenticated users interact with the system (B)</p> Signup and view all the answers

Which of the following best describes a Constrained Data Item (CDI) in the Clark-Wilson model?

<p>Data that has a predetermined integrity level and is protected (C)</p> Signup and view all the answers

In the Graham-Denning model, what defines the set of constraints for subjects accessing objects?

<p>The domain associated with the subjects (D)</p> Signup and view all the answers

Which procedure in the Clark-Wilson model validates the integrity of constrained data items?

<p>Integrity Verification Procedure (IVP) (C)</p> Signup and view all the answers

What role do Transformation Procedures (TP) play in the Clark-Wilson model?

<p>They regulate how constrained data items can be modified (B)</p> Signup and view all the answers

What are the eight primitive protection rights described in the Graham-Denning model?

<p>Tasks that subjects can execute to manage objects or other subjects (A)</p> Signup and view all the answers

Which of the following is NOT a part of the multi-faceted approach to access control in the Clark-Wilson model?

<p>Automatic data encryption (C)</p> Signup and view all the answers

In terms of authorization methods, which security principle is best exemplified by the Graham-Denning model?

<p>Least privilege for users to minimize access (B)</p> Signup and view all the answers

What is the primary advantage of using roles in access control rather than assigning individual access rights?

<p>Roles simplify access management by automatically assigning privileges based on user roles. (C)</p> Signup and view all the answers

How do mandatory access controls (MACs) function in relation to data classification?

<p>MACs utilize sensitivity levels to limit access based on data classification schemes. (A)</p> Signup and view all the answers

What distinguishes attribute-based access controls (ABACs) from traditional role-based access controls (RBAC)?

<p>ABACs use individual characteristics or attributes to regulate access, whereas RBAC relies on user roles. (D)</p> Signup and view all the answers

What is the main purpose of an access control matrix?

<p>To integrate access control lists and capabilities tables for holistic access management. (D)</p> Signup and view all the answers

What does the term 'sensitivity levels' refer to in the context of access control?

<p>The confidentiality requirement of the information as defined by its classification. (B)</p> Signup and view all the answers

What characteristic differentiates tasks from roles in access control systems?

<p>Tasks are more granular and usually shorter-term compared to roles. (D)</p> Signup and view all the answers

How do organizations typically manage access rights for users who regularly change roles?

<p>By assigning access to roles or tasks that users can easily join or leave. (A)</p> Signup and view all the answers

What role does NIST propose for attribute-based access controls (ABACs) in relation to other access control methodologies?

<p>ABACs are the foundational approach upon which other methods like MAC and RBAC are built. (A)</p> Signup and view all the answers

Flashcards

Group-based Authorization

A system matches authenticated users to groups, granting access based on group permissions.

Centralized Authorization

A single system authenticates and authorizes users, issuing credentials valid across multiple systems.

Authorization Credentials

Credentials issued by an authenticator, enabling access across multiple systems.

Accountability

The ability to track all system actions back to the authenticating user.

Signup and view all the flashcards

System Logs

Records of system events, including access attempts and modifications.

Signup and view all the flashcards

Covert Channels

Hidden communication methods within a computer system.

Signup and view all the flashcards

Reference Monitor

A part of a system that manages access controls.

Signup and view all the flashcards

Trusted Computing Base (TCB)

The system components responsible for enforcing security policies.

Signup and view all the flashcards

Role-Based Access Control (RBAC)

A system where access rights are assigned to roles instead of individual users, making it easier to manage access for multiple employees performing the same task. Users inherit permissions based on assigned roles.

Signup and view all the flashcards

Task-Based Access Control

A system where access rights are granted for specific tasks, allowing granular control over access for short-term or temporary activities. Users gain access only for the specific task they need.

Signup and view all the flashcards

Mandatory Access Control (MAC)

A system that uses data classification and user ratings to restrict access based on sensitivity levels. Access is controlled by predetermined rules, not individual discretion.

Signup and view all the flashcards

Sensitivity Levels

Categories used in MAC systems to classify information according to its confidentiality requirements. Higher sensitivity levels require higher clearance for access.

Signup and view all the flashcards

Attribute-Based Access Control (ABAC)

A system that uses user attributes like name, job function, or location to determine access rights. It's flexible and allows for customized access rules based on specific conditions.

Signup and view all the flashcards

Access Control List (ACL)

A list associated with an object (like a file) that specifies which users or groups have access rights to that object. It acts as a gatekeeper for resources.

Signup and view all the flashcards

Capabilities Table

A table associated with a user that lists the objects the user has access to, along with their permissions for each object. It focuses on user access.

Signup and view all the flashcards

Access Control Matrix

A two-dimensional matrix that combines elements of the Access Control List and Capabilities table to create a comprehensive access control system. Users are represented in rows, and objects in columns, showcasing who can access what.

Signup and view all the flashcards

Clark-Wilson Model

A security model that uses well-defined transactions and restricted programs to ensure data integrity. It aims to protect data by ensuring that changes are made through trusted procedures.

Signup and view all the flashcards

Constrained Data Item (CDI)

Data whose integrity is protected by the Clark-Wilson model. Its value is strictly controlled and can only be modified through trusted procedures.

Signup and view all the flashcards

Unconstrained Data Item

Data that is not protected by the Clark-Wilson model. This might be user input or any output.

Signup and view all the flashcards

Integrity Verification Procedure (IVP)

A procedure that checks the integrity of a CDI before it is read or used. It ensures the data is accurate and hasn't been tampered with.

Signup and view all the flashcards

Transformation Procedure (TP)

A trusted procedure that allows changes to a CDI. It ensures that only authorized modifications are permitted.

Signup and view all the flashcards

Graham-Denning Model

A security model that focuses on managing access rights between subjects and objects. Subjects can perform certain actions on objects based on a set of defined rights.

Signup and view all the flashcards

Domain

A set of restrictions that control how subjects can access objects in the Graham-Denning model. Each subject has a domain that determines their permissible actions.

Signup and view all the flashcards

Primitive Protection Rights (Commands)

Basic actions subjects can perform on objects in the Graham-Denning model. These rights allow subjects to manipulate objects in specific ways.

Signup and view all the flashcards

Study Notes

Module 1: Security Technology: Access Control, Firewalls, and Protecting Remote Connections

  • Access control is the method systems use to determine user admission to trusted areas, encompassing information systems, secure zones, and the physical location. It mandates permissions or privileges for subjects (users/systems) on objects (resources), specifying access, use, and location.

  • Access controls in the 1960s-70s were primarily mandatory access controls (MACs) and discretionary access controls (DACs). MACs are nondiscretionary, lattice-based, while DACs allow peer-to-peer resource sharing.

  • Discretionary access controls (DACs) give users control over resource access, allowing general or specific access, often for shared resources (e.g., a hard drive).

  • Nondiscretionary access controls (NDACs) are centrally managed, examples include lattice-based access control (LBAC), enabling users to be assigned access matrices for specific areas. This is often implemented via access control lists (ACLs) and capabilities tables.

  • Role-based access control (RBAC) ties access to roles, granting automatic access based on assigned position, while task-based access control (TBAC) links access to specific tasks, providing granular control for short-term assignments.

  • Attribute-based access control (ABAC) is another approach, using subject attributes (e.g., job function, address, etc.) to regulate access to specific resources.

Access Control Mechanisms

  • Identification: The process of labeling an entity with a unique identifier, mapping it to a single entity within the security domain. This may include various elements concatenated for uniqueness.

  • Authentication: Verification of an unauthenticated entity's claimed identity, including something the entity knows (password), has (token), or is (biometric).

  • Authorization: Matching an authenticated entity to a list of information assets and corresponding access levels using ACLs or access control matrices. This can be done by individually verifying each entity, grouping entities by membership, or by utilizing a central authorization system.

  • Accountability: Ensuring all actions are attributed to an authenticated identity using system logs, database journals, and audits to trace particular resource use.

Firewalls

  • Firewalls are hardware and/or software barriers that control data flow between untrusted and trusted networks, preventing unauthorized data transfer.

  • Packet-filtering firewalls: Inspect data packet headers and apply rules to allow or drop them based on criteria like IP source and destination address, protocol, and ports.

  • Stateful Packet Inspection (SPI) firewalls: Maintain a state table of active connections to expedite filtering of related traffic; they keep track of conversations.

  • Application Layer Proxy Firewalls: Operate at a higher network level, examining data contents for application-specific criteria.

  • Firewall architectures include single bastion hosts (a single device separating trusted and untrusted networks), screened host firewalls (combining a packet filtering router with another device like an application layer proxy), and screened subnet (DMZ) architectures (using a dedicated segment between networks via a separate router.

Remote Connections

  • Virtual Private Networks (VPNs) establish secure data channels over public networks like the Internet, encrypting data in transit.

Intrusion Detection and Prevention Systems (IDPSs)

  • IDPSs monitor and analyze network activity to detect intrusions or suspicious events.

  • IDPS Terminology:

  • Alarm clustering: Combining similar alarms for easier management

  • Alarm filtering: Classifying alerts based on factors like attack signature or type.

  • Alert or Alarm: Notification of an attack event

  • Confidence value: The probability for an alert to indicate a genuine attack.

  • Evasion: Attacker techniques to avoid detection

  • False Positive: An alert from an IDPS without an actual attack

  • False Negative: Failure of an IDPS to detect an actual attack

  • Noise: Alerts not posing significant security risks

  • Site Policy: Guidelines for IDPS configuration deployment

  • True Attack Stimulus: The event causing an IDPS to alert.

  • IDPS types:

  • Network-based IDPS (NIDPS): Monitors a network segment for traffic anomalies

  • Host-based IDPS (HIDPS): Monitors a host computer for suspicious activity

  • Application IDPS: Monitors (one or more) host systems for known application-specific attacks

  • IDPSs can be deployed via centralized, partially, or fully distributed architectures; each strategy has benefits and drawbacks.

Honeypots, Honeynets, and Padded Cell Systems

  • Honeypots and honeynets are decoy systems designed to monitor or divert attackers, providing data about attempted intrusions.

  • A padded cell is a security enhancement to a honeypot designed to prevent damage to the main network.

Trap-and-Trace Systems

  • Trap-and-trace methods combine attractions (honeypots) with a tracing feature designed to track the malicious activity to its source. These can be used to identify sources for criminal prosecution but have legal implications to consider.

Scanning and Analysis Tools

  • Vulnerability scanners (like Nessus, Nmap, and OpenVAS) identify exposed usernames, open network shares, configuration problems, and other vulnerabilities, while passive scanners observe network traffic without initiating traffic, primarily identifying known vulnerabilities on client machines or servers.

  • Packet sniffers (such as Wireshark) capture and analyze network traffic to diagnose issues and detect malicious traffic, but misuse may reveal sensitive personal or business information.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Untitled Quiz
37 questions

Untitled Quiz

WellReceivedSquirrel7948 avatar
WellReceivedSquirrel7948
Untitled Quiz
18 questions

Untitled Quiz

RighteousIguana avatar
RighteousIguana
Untitled Quiz
50 questions

Untitled Quiz

JoyousSulfur avatar
JoyousSulfur
Untitled Quiz
48 questions

Untitled Quiz

StraightforwardStatueOfLiberty avatar
StraightforwardStatueOfLiberty
Use Quizgecko on...
Browser
Browser