Access Control and Security Lecture Notes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

Flashcards about Access Control

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

What is Access Control?

Policy-driven control of access to systems, data, and dialogues.

2
New cards

What are the three functions of Access Control?

Authentication, Authorization, and Auditing.

3
New cards

What is Authentication in the context of Access Control?

Assessing the identity of each individual claiming to have permission to use a resource.

4
New cards

What is Authorization in the context of Access Control?

Specific permissions that an authenticated user should have, given their authenticated identity.

5
New cards

What is Auditing in the context of Access Control?

Collecting information about an individual’s activities in log files.

6
New cards

What is Two-Factor Authentication (2FA)?

A security process requiring two different authentication factors to verify users.

7
New cards

What is Multifactor Authentication (MFA)?

A login process requiring multiple methods of authentication from independent categories.

8
New cards

What is Individual Access Control?

Access control rules that apply to individual users and devices, defining specific permissions for each entity.

9
New cards

What is Role-based Access Control?

Determines common sets of permissions enforced to entities with similar objectives and privileges.

10
New cards

What is Mandatory Access Control?

Departments cannot alter access control rules set by higher authorities.

11
New cards

What is Discretionary Access Control?

The department has discretion over giving access to individuals, within policy standards set by higher authorities.

12
New cards

What is Multilevel Security?

Rate documents by sensitivity (public, sensitive but unclassified, secret, top secret).

13
New cards

What does ISO/IEC 9.1 (Secure Areas) concern?

Securing physical areas, including buildings, equipment rooms, and office areas.

14
New cards

What are the key controls in ISO/IEC 9.1 regarding physical security?

Securing the building physical perimeter, controlling entry points, and implementing physical entry controls.

15
New cards

What are the key considerations for public access, delivery, and loading areas under ISO/IEC 9.1?

Limit internal people's access, inspect incoming shipments, and separate outgoing shipments.

16
New cards

What are the key considerations for securing offices, rooms, and facilities under ISO/IEC 9.1?

Locate sensitive areas away from public access and control entry using locks or access cards.

17
New cards

What are the key considerations for protecting against external and environmental threats under ISO/IEC 9.1?

Locate hazardous materials away from sensitive areas and ensure adequate firefighting equipment.

18
New cards

What are the rules for working in a secure area according to ISO/IEC 9.1?

Implement special rules for people working in secure areas, and ensure areas are locked and checked periodically.

19
New cards

What are the key considerations for equipment siting and protection under ISO/IEC 9.2?

Place sensitive equipment in secure areas to minimize access and protect against environmental threats.

20
New cards

What supporting utilities should be considered under ISO/IEC 9.2?

Electricity, water, HVAC, uninterruptible power supply (UPS), and backup generator.

21
New cards

What are the key considerations for security during off-site equipment maintenance under ISO/IEC 9.2?

Maintain equipment according to specifications, and authorize off-site maintenance.

22
New cards

What are the key considerations for secure disposal or reuse of equipment under ISO/IEC 9.2?

Ensure sensitive data is removed before disposal, and property removal is properly authorized.

23
New cards

What is a reusable password?

It is used for weeks or months at a time.

24
New cards

What is a one-time password?

It is only used once.

25
New cards

What are important password policies?

Not using same passwords at multiple sites, password duration policies, and policies prohibiting shared accounts.

26
New cards

What constitutes a strong password?

At least eight characters long, with mixed case, digits, and non-alphanumeric characters.

27
New cards

Why must all passwords be stored using a secure hashing algorithm and regularly tested?

Ensure they are not easily cracked.