Access Controls and Firewall Technologies

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Security controls

pertain to different mechanisms that act as safeguards or countermeasures prescribed for aninformation system to protect the C-I-A of the system and its information

2
New cards

Physical Controls

Typically provide ways of controlling, directing or preventing the movement of people and equipment throughout a specific physical location, such as an office suite, factory or other facility.

3
New cards

Technical Controls

Also called logical controls are security controls that computer systems and networks directly implement. These provide automated protection from unauthorized access or misuse, facilitate detection of security violations and support security requirements for applications and data.

4
New cards

Administrative Controls

Also known as managerial controlsare directives, guidelines or advisories aimed at the people within the organization. They provide frameworks, constraints and standards for human behavior, and should cover the entire scope of the organization’s activities and its interactions with external parties and stakeholders

5
New cards

Authentication

This process of verifying or proving the user’s identification is known as

6
New cards

Something you know

Passwords or passphrases

7
New cards

Something you have

Tokens, memory cards, smart cards

8
New cards

Something you are

Biometrics, measurable characteristics

9
New cards

Single-factor Authentication

SFA

10
New cards

Multi-factor Authentication

MFA

11
New cards

SFA, MFA

Methods of Authentication

12
New cards

Knowledge-based, Token-based, Characteristic-based

three common techniques for authentication

13
New cards

Knowledge-based authentication

uses a passphrase or secret code to differentiate between an authorized and unauthorized user. If you have selected a personal identification number (PIN), created a password or some other secret value that only you know, then you have experienced knowledge-based authentication.

14
New cards

Token or Characteristics

For better security, a second or third form of authentication that is based on a ____ or ____ would be required prior to resetting the password.

15
New cards

Authorization

determine which resources users can access, along with the operations that users can perform. Some systems accomplish this by using an access control list, or an ACL

16
New cards

ACL

determines whether a user has certain access privileges once the user authenticates

17
New cards

Authorization

can also control when a user has access to a specific resource. For example, employees may have access to a sales database during work hours, but the system locks them out afterhours.

18
New cards

Accountability or Non-repudiation

This is a legal term and is defined as the protection against an individual falsely denying having performed a particular action

19
New cards

Accountability or Non-repudiation

It provides the capability to determine whether a given individual took a particular action, such as created information, approved information or sent or received a message.

20
New cards

Logical Controls

Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC)

21
New cards

Discretionary Access Control (DAC)

a user who has access to a file is usually able to share that file with or pass it to someone else. This grants the user almost the same level of access as the original owner of the file.

22
New cards

Mandatory Access Control (MAC)

Means that only properly designated security administrators, as trusted subjects, can modify any of the security rules that are established for subjects and objects within the system. it is mandatory for security administrators to assign access rights or permissions; with Discretionary Access Control, it is up to the object owner’s discretion

23
New cards

Role Based Access Control (RBAC)

provides each worker privileges based on what role they have in the organization. Only Human Resources staff have access to personnel files, for example; only Finance has access to bank accounts; each manager has access to their own direct reports and their own department.

24
New cards

Attribute-Based Access Control (ABAC)

Allows access based on attributes of the object (resource) to be accessed, the subject (user) accessing the resource, and environmental factors regarding how the object is to be accessed, such as time of day.

25
New cards

Privileged access management concept

To preserve the confidentiality of information and ensure that it is only available to personnel who are authorized to see it, we use

26
New cards

Privileged access management concept

It means each user is granted access only to the items they need and nothing further. The more critical information a person has access to, the greater the security should be around that access

27
New cards

firewall

is a system, or group of systems, that enforces an access control policy between networks

28
New cards

Common properties of firewalls

are resistant to network attacks, are the only transit point between internal corporate networks and external networks because all traffic flows through the firewall, enforce the access control policy

29
New cards

Types of firewall

Packet Filtering (Stateless) Firewall, Stateful firewall, application gateway firewall (proxy firewall), Next-generation firewalls (NGFW), Host-based (server and personal) firewall, Transparent firewall, Hybrid firewall,

30
New cards

Packet Filtering (Stateless) Firewall

It is typically a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information. They are stateless firewalls that use a simple policy table look up that filters traffic based on specific criteria.

31
New cards

Stateful firewalls

provide stateful packet filtering by using connection information maintained in a state table

32
New cards

Stateful filtering

is a firewall architecture that is classified at the network layer.

33
New cards

application gateway firewall (proxy firewall),

as shown in the figure, filters information at Layers 3, 4, 5, and 7 of the OSI reference model. Most of the firewall control and filtering is done in software. When a client needs to access a remote server, it connects to a proxy server. The proxy server connects to the remote server on behalf of the client. Therefore, the server only sees a connection from the proxy server.

34
New cards

Next-generation firewalls (NGFW)

go beyond stateful firewalls by providing: • Integrated intrusion prevention • Application awareness and control to see and block risky apps • Upgrade paths to include future information feeds • Techniques to address evolving security threats

35
New cards

Host-based (server and personal) firewall

A PC or server with firewall software running on it.

36
New cards

Transparent firewall

Filters IP traffic between a pair of bridged interfaces.

37
New cards

Hybrid firewall

A combination of the various firewall types. For example, an application inspection firewall combines a stateful firewall with an application gateway

38
New cards

Zone-based policy firewalls (ZPFs)

use the concept of zones to provide additional flexibility

39
New cards

zone

is a group of one or more interfaces that have similar functions or features.

40
New cards

Zones

help you specify where a Cisco IOS firewall rule or policy should be applied. In the figure, security policies for LAN 1 and LAN 2 are similar and can be grouped into a zone for firewall configurations.