Unit 3, Additional Basic Functions of Cyber Security and Their Implementation

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/76

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:33 PM on 1/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

77 Terms

1
New cards

What is the difference between identification and authentication?

Identification is asserting an identity to the system (like a username). Authentication is proving that identity belongs to the person attempting access (like providing a password).

2
New cards

What are the three components of access control?

1) Identification - asserting identity, 2) Authentication - proving identity, 3) Authorization - determining what the authenticated identity can do.

3
New cards

What is the main problem with shared/joint identities?

Lack of accountability - you cannot trace actions back to specific individuals, making security investigations and compliance impossible.

4
New cards

What are the four authentication factors?

1) Something you KNOW (passwords), 2) Something you HAVE (tokens), 3) Something you ARE (biometrics), 4) Something you DO (behavioral patterns).

5
New cards

According to current NIST guidelines, should passwords be changed frequently?

No. Frequent mandatory password changes lead to weaker passwords as users create predictable patterns.

6
New cards

What provides more password security: length or complexity?

Length provides exponentially more security than complexity.

7
New cards

How many more combinations does a 9-character password have versus an 8-character password (using 62 symbols)?

62 times more combinations.

8
New cards

What are the current NIST password best practices?

Minimum 8+ characters (12+ preferred), unique per system, no mandatory periodic changes, check against breach databases, use password managers.

9
New cards

Why is MFA critical for security?

MFA prevents 99.9% of attacks because even if passwords are compromised, attackers need the additional factor to gain access.

10
New cards

What is the primary limitation of biometric authentication?

Biometric identifiers cannot be changed if compromised.

11
New cards

How do time-based security tokens prevent replay attacks?

They generate dynamic codes valid only for short time windows.

12
New cards

What should happen if a hardware security token is lost?

1) Immediately disable the token, 2) Issue temporary authentication method, 3) Require identity verification for replacement, 4) Assume account is compromised until secured.

13
New cards

In a scenario where a user enters their account number and receives an SMS code, which is identification and which is authentication?

Account number = Identification, SMS code = Authentication.

14
New cards

Why should a shared 'NurseStation' account NOT be used for accessing patient records?

No individual accountability - cannot trace who accessed what patient data.

15
New cards

What is the principle of least privilege?

Users should be granted only the minimum permissions necessary to perform their job functions.

16
New cards

When is RBAC most efficient compared to ACLs?

RBAC is most efficient for large organizations because you manage permissions by role once.

17
New cards

What is Discretionary Access Control (DAC)?

An access control model where resource owners have the discretion to grant or deny access to their resources.

18
New cards

What is the main vulnerability of DAC systems?

Resource owners may lack security expertise to make appropriate access decisions.

19
New cards

What is Mandatory Access Control (MAC)?

An access control model where a central authority sets security policies that cannot be overridden by resource owners.

20
New cards

What are the trade-offs between MAC and DAC?

MAC provides consistent security but is rigid; DAC provides flexibility but may have inconsistent security decisions.

21
New cards

What is separation of duties in RBAC?

Designing roles so no single person can control critical end-to-end processes without oversight.

22
New cards

How does permission inheritance work in RBAC?

Users inherit ALL permissions from ALL roles they are assigned to.

23
New cards

What security risk can occur with multiple role assignments in RBAC?

Permission accumulation - users may receive broader access than necessary.

24
New cards

Why can't traders with INTERNAL clearance be assigned to a group requiring CONFIDENTIAL access in MAC?

In MAC, users cannot inherit permissions to access data classified above their clearance level.

25
New cards

What access control model should a medical practice use for nurses, assistants, and admin staff?

RBAC - Create roles for each job function with appropriate permissions.

26
New cards

What access control model allows university professors to grant research file access to students?

Discretionary Access Control (DAC).

27
New cards

What access control model should handle public marketing materials, confidential trade secrets, and customer data?

Hybrid approach: Biba for financial integrity, Bell-LaPadula for trade secret confidentiality.

28
New cards

What is the purpose of the Bell-LaPadula model?

To protect confidentiality by preventing unauthorized disclosure of sensitive information.

29
New cards

What are the two Bell-LaPadula rules?

1) No Read Up - users can only read data at their level or lower, 2) No Write Down - users can only write data at their level or higher.

30
New cards

What documents can Agent Smith read under Bell-LaPadula with SECRET clearance (Level 3)?

SECRET (Level 3), CONFIDENTIAL (Level 2), and UNCLASSIFIED (Level 1) documents. Cannot read TOP SECRET (Level 4).

31
New cards

What classification level will Agent Smith's written documents have with SECRET clearance (Level 3)?

SECRET or higher (TOP SECRET). Cannot write CONFIDENTIAL or UNCLASSIFIED documents due to 'no write down' rule.

32
New cards

What is the 'classification creep' problem in Bell-LaPadula?

Documents migrate upward in classification when high-clearance users modify them, making routine information inaccessible to other staff requiring manual re-classification.

33
New cards

What is the purpose of the Biba model?

To protect data integrity by preventing unauthorized modifications that could corrupt trusted information.

34
New cards

What are the Biba model rules?

1) No Write Up - users can only modify data at their integrity level or lower, 2) No Read Down - users can only read data at their level or higher (often relaxed).

35
New cards

What can a junior analyst (MEDIUM integrity) do if they find an error in a HIGH integrity financial record under Biba?

Create a MEDIUM integrity correction request that a HIGH integrity user must review and apply. Cannot directly edit HIGH integrity data.

36
New cards

How can integrity be restored in the Biba model after lower-level modification?

A higher-integrity user reviews and validates all content, then creates a new version at their integrity level, essentially 'vouching for' the modified content.

37
New cards

When should you use Bell-LaPadula vs Biba models?

Bell-LaPadula for confidentiality protection (classified info, trade secrets). Biba for integrity protection (financial transactions, medical protocols, quality control).

38
New cards

What process must Dr. Williams follow to restore HIGH integrity after Nurse (MEDIUM) adds notes?

Dr. Williams must review and validate all content, then create a new HIGH integrity version based on the MEDIUM integrity document.

39
New cards

Why are pure Bell-LaPadula and Biba models often too restrictive for business?

They create operational paralysis - Bell-LaPadula causes classification creep, Biba prevents legitimate collaboration. Practical implementations use hybrid approaches with exceptions.

40
New cards

How would you implement security for a government contractor with both classified defense projects and commercial software development?

1) Bell-LaPadula for classified projects with strict classification levels, 2) RBAC for commercial teams, 3) Complete environment separation, 4) Comprehensive audit trails with DLP tools.

41
New cards

What models should a multinational bank use for public reports, trading algorithms, and customer transactions?

Biba for financial reports (integrity), Bell-LaPadula for trading algorithms (confidentiality), hybrid Bell-LaPadula and Biba for customer transactions.

42
New cards

What are the two purposes of evidence preservation?

1) Technical diagnosis - recreate events for troubleshooting and security analysis, 2) Legal compliance - provide court-admissible proof of events.

43
New cards

What are the four pillars of legally admissible evidence?

1) Authenticity - prove evidence is what you claim, 2) Integrity - prove it hasn't been altered, 3) Reliability - collected using accepted methods, 4) Completeness - relevant evidence not omitted.

44
New cards

What are the essential elements that every quality log entry must contain (5 W's)?

WHO (account name), WHEN (timestamp), WHAT (action description), WHERE (system/resource), RESULT (success/failure status).

45
New cards

What is the difference between a standard copy and a forensic copy?

Standard copy: file content only, updates timestamps, not legally admissible. Forensic copy: bit-for-bit exact replica, preserves metadata, cryptographically verified, court admissible.

46
New cards

What is the purpose of hash verification in digital forensics?

To prove the forensic copy is identical to the original evidence by comparing cryptographic hashes (MD5, SHA-256) - if hashes match, the copy is authentic and unaltered.

47
New cards

What is write-blocking and why is it essential?

Hardware/software that prevents any modification of original evidence during collection. Essential because any alteration invalidates evidence for legal proceedings.

48
New cards

What should you do if you discover a compromised computer with no apparent entry point?

Immediately preserve ALL data on external medium. Future forensic techniques may reveal hidden indicators that current tools cannot detect.

49
New cards

What is chain of custody?

Documented proof that evidence has been continuously controlled and unaltered from collection to court presentation, including who handled it, when, where, and why.

50
New cards

What information must be documented for every evidence transfer?

From whom (name, title, signature), to whom (name, title, signature), date/time/location of transfer, reason for transfer, evidence condition verification.

51
New cards

Why is chain of custody critical for legal proceedings?

Without proper chain of custody documentation, evidence can be ruled inadmissible in court because you cannot prove it wasn't tampered with or contaminated.

52
New cards

What are indicators of compromise (IoCs)?

Signs that an attack has been successful, such as unauthorized logins, malware installation, unexpected file changes, unusual network traffic, or inappropriate system functions.

53
New cards

Why should organizations preserve evidence even for unknown attack methods?

To ensure that any potential evidence can be analyzed and used in future investigations, regardless of the attack method.

54
New cards

What are examples of network-level IoCs?

Connections to known bad IPs, unusual outbound traffic, DNS queries to suspicious domains, traffic on unexpected ports, large data uploads indicating exfiltration.

55
New cards

What are examples of system-level IoCs?

Unauthorized account creation, privilege escalation attempts, unusual process execution, file system modifications, persistence mechanism installation.

56
New cards

What evidence is required for GDPR Article 33 breach notification?

Nature of breach, categories and volumes of data affected, likely consequences, measures taken to address breach - all within 72 hours and forensically sound.

57
New cards

What makes cloud forensics challenging compared to traditional forensics?

Data location uncertainty, shared responsibility models, virtual machine snapshots, jurisdiction issues, CSP cooperation requirements, multi-tenant isolation.

58
New cards

What is the challenge with mobile device forensics?

Strong encryption, regular security updates, cloud synchronization, app sandboxing, and legal access restrictions make evidence extraction difficult.

59
New cards

How do AI and automation help with digital forensics?

Automated malware detection, anomaly detection in large datasets, pattern recognition beyond human capabilities, correlation across multiple evidence sources, faster processing.

60
New cards

How do the Unit 3 sections work together in a complete security system?

Identification/Authentication → Rights Management → Policy Enforcement → Audit Evidence creates end-to-end access control with accountability.

61
New cards

How does Unit 3 support GDPR compliance?

Identity management (accountability), access controls (data minimization), security models (automated privacy enforcement), evidence preservation (breach notification documentation).

62
New cards

How do Unit 3 concepts apply to Zero Trust architecture?

Never trust/always verify (continuous authentication), least privilege (rights management), micro-segmentation (policy enforcement), continuous monitoring (evidence collection).

63
New cards

How does AWS IAM implement Unit 3 concepts?

Users/Groups/Roles (RBAC), MFA enforcement (authentication), resource policies (security models), CloudTrail logs (evidence preservation).

64
New cards

How do Unit 3 concepts apply to DevSecOps CI/CD pipelines?

Service accounts (identity), pipeline permissions (rights management), security gates (policy enforcement), build logs (evidence preservation).

65
New cards

What Unit 3 skills does a Security Architect need?

Enterprise identity management design, access control architecture, security model application to business requirements, forensic readiness planning.

66
New cards

What Unit 3 skills does a Digital Forensics Analyst need?

Evidence collection procedures, identity correlation across systems, access control analysis for investigations, security model understanding.

67
New cards

What Unit 3 skills does a Compliance Officer need?

Access control audit procedures, authentication requirements for regulations, security model compliance verification, evidence documentation for auditors.

68
New cards

Design access control for a hospital with doctors, nurses, admin staff, and patient data with different sensitivity levels.

Hybrid approach: RBAC for role-based permissions, Bell-LaPadula for patient data confidentiality levels, Biba for medical protocol integrity, comprehensive audit logging.

69
New cards

How would you implement security for a multinational corporation with public marketing, confidential trade secrets, and different data protection laws?

Layered approach: MAC for classified trade secrets, RBAC for global efficiency, DAC for departmental flexibility, ACLs for granular control, with comprehensive audit trails.

70
New cards

What security models and evidence procedures for a financial institution handling external data, internal processing, and final authorized transactions?

Biba integrity model with LOW (external), MEDIUM (internal), HIGH (authorized) levels, plus comprehensive transaction logging and forensic readiness for regulatory compliance.

71
New cards

What are the top 5 security problems for a company using shared passwords, no MFA, and giving everyone full access?

1) No individual accountability, 2) No authentication strength, 3) Principle of least privilege violation, 4) No audit trail, 5) Cannot revoke individual access.

72
New cards

Why might Bell-LaPadula be inappropriate for a collaborative software development environment?

Classification creep would make code inaccessible when senior developers modify it, preventing collaboration and code reviews essential for development.

73
New cards

When would you choose MAC over RBAC for an organization?

When security is more important than operational efficiency, such as government classified environments where central control and consistent enforcement are critical.

74
New cards

How do modern password policies differ from traditional policies and why?

Modern: longer passwords, no forced changes. Traditional: complex passwords, frequent changes. Research showed traditional policies led to weaker, predictable passwords.

75
New cards

Design authentication for a banking app considering security and usability.

Username/password + MFA (SMS/app), biometric for convenience on trusted devices, risk-based authentication for unusual access patterns, comprehensive logging.

76
New cards

Explain how to preserve evidence of a suspected insider threat involving financial fraud.

Forensic imaging of user systems, complete access logs, email/communication preservation, database transaction logs, chain of custody for all evidence, coordinate with legal/HR.

77
New cards

How would you implement least privilege for a growing startup?

RBAC with role definition based on job functions, regular access reviews, automated provisioning/deprovisioning tied to HR systems, principle of deny by default.

Explore top flashcards