Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/15

Click to flip

15 Cards in this Set

  • Front
  • Back
why is access control implemented
Access control is implemented to protect an information system from unauthorized access and damage, and to ensure that system data maintains its
availability
Availability ensures that information systems and system data are always accessible to users
confidentiality
Confidentiality ensures that unauthorized parties cannot access information.
integrity
Integrity ensures that information is not subject to unintentional and unauthorized modification, and guarantees the consistency of the data.
Why should Network administrators implement access controls
to reduce risks to the information system and minimize possible damage or loss to system data.
What are the Network administrators should implement access controls to reduce risks to the information system and minimize possible damage or loss to system data.
corrective
detective
preventive
corrective
Corrective controls rectify system damage by returning the system to its undamaged state.
detective
Detective controls warn of events that are damaging to the information system or system data.
preventive
Preventive controls prevent or inhibit events that are damaging to the information system or system data.
What are the three types of system access controls
logical, physical, and administrative.
Logical controls
also known as technical controls, restrict system access using techniques such as access control lists (ACLs), encryption, and smart cards.
Physical controls
are restrictions to control system access, such as alarms, security guards, and locking doors to restrict access to system hosts and server rooms.
Administrative controls
consist of an organization's system security policy, supervision of users, and security awareness training.
Why must Access control rules implemented on the system
to determine a subject's access to an object, such as a file or system service.
What is a subject
is a user who actively makes the request for access to the object.