Security +

Card Set Information

Author:
whodeany
ID:
144788
Filename:
Security +
Updated:
2012-03-30 17:13:28
Tags:
Sec1
Folders:

Description:
Section 1
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user whodeany on FreezingBlue Flashcards. What would you like to do?


  1. Three main access control methods
    • Mandatory Access Control
    • Discretionary Access Control
    • Role-Based Access Control
  2. Mandatory Access Control (MAC)
    -Static model that uses predefined set of access privileges for files on the system

    • -In a MACenvironment, the System Administrator is responsible for assigning sensitivity
    • or security labels, users cannot share resources dynamically
  3. Discretionary Access Control (DAC)
    • In this environment, every file has an owner who has complete control of that file.

    • •The owner is responsible for granting access and assigning rights. Users are granted rights
    • explicitly.

    • •This systems uses Access Control Lists to determine who has what rights to a file, process,
    • and/or system.
  4. Role Based Access Control (RBAC)
    •This access control methodology is based on roles a user has in his organization.

    • •Every role is given access rights to a set of objects. A great way of providing access
    • control in a place where high turnover is an issue.

    • In this environment one cannot pass access permissions on to other users at own
    • discretion, its all based on the role each individual is in
  5. Biometrics
    •Most secure form of authentication

    •Most costly method of implementing Authentication

    • •Identify the user by scanning unique physical attributes of a user:
    • Ex.
    • •Fingerprint

    •Retina Scan

    •Palm Scan
  6. Multifactor
    Two or more authentication methods used together
  7. Mutual
    •Client authenticates to server, and server authenticates to client

    • •Not implemented on a larger scale due to cost and complexity of having users obtaining and
    • using certificates
  8. Challenge Handshake Authentication protocol (CHAP)
    Based on a shared secret between authenticator and user. Upon initial contact a three way handshake takes place.

    • Handshake constsist of
    • •ChallengePacket (System to User)
    • •Response Packet(User to System) 0
    • •Success or failure packet (System to User)
  9. Kerberos
    • Guards a network with three elements
    • Authentication
    • Accounting
    • Auditing

What would you like to do?

Home > Flashcards > Print Preview