Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CYB1UofI_FISCH3.2

What Are Access Controls

QuestionAnswer
what term sounds technical like it only belongs in high security computing facilities but we deal with daily access controls
what is an example of how we use access controls daily P1 when you lock or unlock the doors of your house
what type of access control is locking or unlocking doors of your house physical access control based on your keys
what do your keys act as when used as physical access control for locking/unlocking doors of your house something you have function as methods of both authentication and authorization
what is an example of how we use access controls daily P2 when you start your car you're also likely to use a key
what type of access control is starting your car with a key physical access control based on your keys
what do your keys act as when used as physical access control for starting your car something you have function as methods of both authentication & authorization some newer cars key may include an extra layer of security with radio frequency identification tags (RFID) - certificate like identifiers stored on the key
what is RFID stand for radio frequency identification tags
what are radio frequency identification tags certificate like identifiers stored on the key
what is an example of how we use access controls daily P3 upon reaching place of employment you might use a badge to enter the building
what factor does an employee badge use something you have
what is an example of how we use access controls daily P4 when you sit down in front of your computer at work and enter your password to access system and resources
what factor does sitting down in the front of your computer at work and enter your password to access system and resources use? something you know
what does sitting down in front of your computer at work and entering your password do you're authenticating yourself and using a logical access control system to access the resources for which you've been given permission
when do we regularly encounter multiple implementations of access control while working, going to school and performing the other activites that make up our day
what do you want to use access controls to carry out basic tasks: allowing access, denying access, limited access, and revoking access
what can we describe most access control issues or situations using four actions: allowing access, denying access, limited access and revoking access
what is allowing access is giving a party access to a given resource
what are examples were we use access control to allow access might want to give a user access to a file might want to give an entire group of people access to all the files in a given directory might allow someone physical access to a resource by giving ur employees a key/badge to your facility
what is denying access is the opposite of granting access.
what happens when you deny access you're preventing a given party from accessing the resource in question
what are examples where we use access control to deny access might deny access to a person attempting to log onto a machine based on the time of day might block unauthorized individuals from entering the lobby of your building beyond business hours
what are many access control systems set to by default set to deny
what is limiting access is allowing only some degree of access to your resources
what is an example of limiting access in a physical security scheme you might have a master key that can open any door in the building an intermediate key that can open only a few doors a low level key that can open only one door
when else might you limit access when you're using applications that may be exposed to attack prone environments
what are examples of applications that ight be exposed to attack prone environments web browsers used on the internet
what is a one way to limit access is by running sensitive applications in sandboxes
what are sandboxes isolated environments containing a set of resources for a given purpose
what do we use sandboxes for to prevent their contents from accessing files, memory, and other system resources with which they shouldn't be interacting
what is a sandbox is an isolated environment that protects a set of resources
what can sandboxes be useful for containing things that you can't trust
what are examples of things that you can't trust that sandboxes are useful for code from public websites
what is an example of a sandbox commonly used to run programs the Java Virtual Machine (JVM) run programs written in the Java programming language
what is the JVM specifically constructed for to protect users against potentially malicious downloaded software
what is revoking access? is taking access away from a party after you've granted it.
what is vital to the security of your system being able to revoke access
what is an example of an instance where revoking access is vital to your security system if you fire an employee you'd want to revoke any access they might have (access to email account, u'r virtual private network (VPN), u'r facility)
when working with computer resources it may be particularly important to be able to revoke access to a given resource quickly
Created by: user-1830624
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards