• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
Subject

An active entity on an organization
Object

A Passive Data File

DAC


Discretionary Access Control




Gives the subject full control of the objects they have been given access to




Including: Sharing the objects with other subjects

MAC


Mandatory Access Control




System-enforced access control based on subject's clearances and object's labels

RBAC


Role-Based Access Control




Subjects are grouped into roles, and each defined role has access permissions based upon the role

Access Control



This is the basis for all security disciplines.



The purpose of access control is to allow authorized users access to appropriate data and deny access to unauthorized users.

Confidentiality



Seeks to prevent the unauthorized disclosure of information: it keeps data secret.



Confidentiality Attack Example: Theft of PII

PII


Personally Identifiable Information




Any information that could identify a person. Including Credit Cards

HIPPA



Health Insurance Portability and Accountability Act



This law requires that medical providers keep the personal and medical information of their patients private.

Integrity

Seeks to prevent unauthorized modification of information
What are the two types of integrity?


1. Data Integrity




2. System Integrity

Data Integrity

Seeks to protect information against unauthorized modification

System Integrity

Seeks to protect a system such as Windows Server 2008 server operating system, from unauthorized modification.
Availability
Ensures that the information is available when needed.
DAD


Disclosure Alteration and Destruction






Disclosure


is the unauthorized disclosure of information

Alteration

Is the unauthorized modification of data.

Destruction
Is making systems unavailable.
Identity


Is a claim.




Example: If you name is PersonX, than you identify yourself by saying I am PersonX.




NOTE: Identity alone is weak because there is no Proof

Authorization




Describes the actions you can perform on a system once you are identified and authenticated.

Accountability

Holds Users accountable for their actions.

Non-Repudiation
Means a user cannot deny (repudiate) having performed a transaction.

Least Privilege




Means users should be granted the minimum amount of access (authorization) required to do their jobs, but no more.




Need to Know

The user must need to know that specific piece of information before accessing it.



Example: If Sebastian's Practice is treating a patient, least privilege could allow him access, but need to know would not.

What is Defense in Depth often called?

Layered Defenses

Defense in Depth

This applies multiple safeguards (also called Controls) to protect an asset.

Control

Measure taken to reduce risk

IDS


Intrusion Detection Systems




This inspects all inbound and outbound network activity and identifies suspicious pattern that may indicate a network or system attack from someone attempting to break into or compromise a system

CIRT


Computer Incident Response Team




Investigates and resolves computer security incidents.

DAC


Discretionary Access Control




Gives subjects full control of objects they have been given access to.




INCLUDING: sharing the objects with other subjects

What are the 3 most common clearances

- Confidential


- Secret


- Top Secret

What are some Non-Linux examples of MAC systems


- Honeywell's SCOMP


- Purple Penelope




NOTE: These systems were developed under tight scrutiny of the U.S. and British governments.

What is a Linux example of MAC system?


- LIDS (Linux Intrusion Detection Systems




NOTE: Lids is a hardened Linux distribution that uses MAC.

NIST


National Institute of Standards and Technology




This is a non-regulatory federal agency under the department of commerce

According to NIST:




What are the 3 rules of RBAC?


1. Role Assignment




2. Role Authorization




3. Transaction Authorization

Role Assignment


A subject can execute a transaction only if the subject has selected or been assigned a role.




NOTE: The identification and authorization process is not considered a transaction. All other user activities are conducted through transactions.


Role Authorization

A subjects active role must be authorized for the subject.
Transaction Authorization

A subject can execute a transaction only if the transaction is authorized through the subject's role memberships, and subject to any constraints that may be applied across users, roles and permissions.
Non-discretionary Access Control

Restricting access to objects based on the identity of the subjects and/or groups to which they belong

Why is RBAC a type of non-discretionary access control?

The users do not have discretion regarding the groups of objects they are allowed to access and are unable to transfer objects to other subjects.
What are the 3 types of access control?


- DAC: Discretionary Access Control


- MAC: Mandatory Access Control


- Non-Discretionary Access Control


Task-Based Access Control



This is based on the tasks each subject must perform, such as writing prescriptions, restoring date from a backup tape, or opening a help-desk ticket.




NOTE: This is another non-discretionary access control model.

Content and context dependent access controls are __________


Not full-fledged access control methods in their own right (as MAC and DAC are), but typically play a defense in depth supporting role.



NOTE: They may be added as additional controls, typically to DAC.


Content-dependent access control

Add additional criteria beyond identification and authentication: the actual content the subject is attempting to access.




EXAMPLE: An employee can view his/her HR Record but is blocked when trying to access others.

Centralized Access Control

Concentrates access control in one logical point for a system or organization.




NOTE: This can be used to provide SSO (Single Sign On)


Authentication

Provide an identity claim

Authorization

Allowing authenticated subject to sign on a system

Accountability

Ability to Audit a system and demonstrate the actions of subjects

Decentralized Access Control





Allow IT administration to occur closer to the mission an operations of the organization.




EXAMPLE: An organization spans multiple locations, and the local sites support and maintain independent system systems, access control databases.




NOTE: On the CISSP exam Decentralized Access Control will be spelled out not to be confused with DAC (Discretionary Access Control)

Distributed Access Control

This is also known as Decentralized Access Control