Cybersecurity: Access Control, Firewalls, and Cryptography Fundamentals

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

What does CIA stand for in Cyber-Security?

Confidentiality, Integrity, Availability

2
New cards

What is the primary focus of Access Control in Cyber-Security?

Controlling who/what can access systems and what they can do with that access.

3
New cards

What are the three main entities involved in Access Control?

Subjects (who/what is attempting access), Objects (assets being accessed), and Rules (governing access).

4
New cards

What is the Reference Monitor Concept (RMC)?

A security mechanism that enforces access control rules and monitors access to objects.

5
New cards

What is the role of a Security Kernel in Access Control?

It implements the Reference Monitor Concept and manages access control operations.

6
New cards

What are the two main approaches to Access Control Management?

Centralized and Decentralized management.

7
New cards

What does the principle of Least Privilege entail?

Users should have only the minimum level of access necessary to perform their tasks.

8
New cards

What are the three factors of authentication?

Something you know (password), something you have (token), and something you are (biometric).

9
New cards

What is Discretionary Access Control (DAC)?

An access control model where users have ownership of resources and can determine access.

10
New cards

What is Mandatory Access Control (MAC)?

An access control model that uses labels to enforce access restrictions, making it more secure than DAC.

11
New cards

What is the Bell-LaPadula model focused on?

Confidentiality, enforcing rules like 'no read up' and 'no write down'.

12
New cards

What does the Biba model emphasize?

Integrity, enforcing rules like 'no read down' and 'no write up'.

13
New cards

What is the purpose of a firewall?

To isolate an organization's internal network from external threats and control traffic flow.

14
New cards

What are the limitations of firewalls?

They cannot protect against attacks that bypass them, internal threats, or unsecured wireless LANs.

15
New cards

What is the False Acceptance Rate (FAR) in biometrics?

The rate at which unauthorized users are incorrectly granted access.

16
New cards

What is the False Rejection Rate (FRR) in biometrics?

The rate at which authorized users are incorrectly denied access.

17
New cards

What does the Crossover Error Rate (CER) indicate?

The point at which the FAR and FRR are equal, indicating the effectiveness of a biometric system.

18
New cards

What is Role-Based Access Control (RBAC)?

An access control model that assigns permissions based on user roles within an organization.

19
New cards

What is Rule-Based Access Control?

An access control model that uses predefined rules to determine access, such as firewall rules.

20
New cards

What is Attribute-Based Access Control (ABAC)?

An access control model that uses attributes of objects, subjects, and actions to determine access.

21
New cards

What is the significance of logs in Access Control?

Logs provide an audit trail to investigate who accessed the system and what actions were taken.

22
New cards

What does the term 'Session Hijacking' refer to?

An attack where an unauthorized party takes control of a user's session.

23
New cards

What is the principle of Separation of Duties?

A security principle that ensures no single individual has control over all aspects of a critical process.

24
New cards

What is the primary function of a packet filtering firewall?

To filter inbound and outbound traffic based on specified rules such as IP address and port number.

25
New cards

What is ingress filtering?

Filtering of inbound traffic to a network.

26
New cards

What is egress filtering?

Filtering of outbound traffic from a network.

27
New cards

What does stateful inspection in firewalls do?

It tracks the state of connections and blocks packets that deviate from the expected state.

28
New cards

What is a state table in the context of firewalls?

A table that monitors the state of each connection, including source and destination addresses and ports.

29
New cards

What is the role of Windows Service Hardening in firewall rules?

It restricts services from establishing connections in ways other than they were designed.

30
New cards

What are connection security rules in firewalls?

Rules that define how and when computers authenticate using IPsec.

31
New cards

What are authenticated bypass rules in firewall settings?

Rules that allow specified computers or users to connect even when inbound rules would block the traffic.

32
New cards

What is the purpose of block rules in firewall configurations?

To explicitly block a particular type of incoming or outgoing traffic.

33
New cards

What do allow rules in firewall settings do?

They explicitly allow a particular type of incoming or outgoing traffic.

34
New cards

What is the default action of inbound and outbound rules in firewalls?

The default action for inbound is to block connections, while for outbound it is to allow connections.

35
New cards

How does basic browsing with HTTP affect internet privacy?

ISPs and others can see both your destination and data.

36
New cards

What is the privacy advantage of using HTTPS over HTTP?

ISPs cannot see your data when using HTTPS.

37
New cards

What does a VPN do in terms of internet privacy?

A VPN can hide your data and destination from ISPs and others.

38
New cards

What is password hashing?

A one-way function that turns data into a fixed-length 'fingerprint' that cannot be reversed.

39
New cards

What is the general workflow for account registration in a hash-based system?

User creates an account, their password is hashed and stored, and on login, the entered password's hash is checked against the stored hash.

40
New cards

Why should you never disclose whether a username or password is incorrect during login attempts?

To prevent attackers from enumerating valid usernames without knowing their passwords.

41
New cards

Where should hashing occur in a web application?

Hashing should always occur on the server side.

42
New cards

What is the significance of salting in password hashing?

Salting adds random data to passwords before hashing to enhance security.

43
New cards

What are the advantages of symmetric ciphers?

They encrypt blocks of plaintext one at a time, and larger blocks are considered more secure.

44
New cards

What is the role of mathematical algorithms in block ciphers?

They perform a series of simple mathematical functions like XOR, addition, and substitution.

45
New cards

What is the importance of key lengths in symmetric ciphers?

Key lengths vary (e.g., 128, 192, 256 bits) and longer keys generally provide stronger security.

46
New cards

What happens during a login attempt in a hash-based account system?

The hash of the entered password is compared to the stored hash, granting access if they match.

47
New cards

What is the purpose of a web proxy?

A web proxy can hide your destination and can also read your data.

48
New cards

What does TOR provide in terms of internet privacy?

TOR helps to anonymize users by routing traffic through multiple nodes, making it difficult to trace.