click below
click below
Normal Size Small Size show me how
CYB1UofI_FISCH3.2
What Are Access Controls
| Question | Answer |
|---|---|
| what term sounds technical like it only belongs in high security computing facilities but we deal with daily | access controls |
| what is an example of how we use access controls daily P1 | when you lock or unlock the doors of your house |
| what type of access control is locking or unlocking doors of your house | physical access control based on your keys |
| what do your keys act as when used as physical access control for locking/unlocking doors of your house | something you have function as methods of both authentication and authorization |
| what is an example of how we use access controls daily P2 | when you start your car you're also likely to use a key |
| what type of access control is starting your car with a key | physical access control based on your keys |
| what do your keys act as when used as physical access control for starting your car | something you have function as methods of both authentication & authorization some newer cars key may include an extra layer of security with radio frequency identification tags (RFID) - certificate like identifiers stored on the key |
| what is RFID stand for | radio frequency identification tags |
| what are radio frequency identification tags | certificate like identifiers stored on the key |
| what is an example of how we use access controls daily P3 | upon reaching place of employment you might use a badge to enter the building |
| what factor does an employee badge use | something you have |
| what is an example of how we use access controls daily P4 | when you sit down in front of your computer at work and enter your password to access system and resources |
| what factor does sitting down in the front of your computer at work and enter your password to access system and resources use? | something you know |
| what does sitting down in front of your computer at work and entering your password do | you're authenticating yourself and using a logical access control system to access the resources for which you've been given permission |
| when do we regularly encounter multiple implementations of access control | while working, going to school and performing the other activites that make up our day |
| what do you want to use access controls to carry out | basic tasks: allowing access, denying access, limited access, and revoking access |
| what can we describe most access control issues or situations using | four actions: allowing access, denying access, limited access and revoking access |
| what is allowing access | is giving a party access to a given resource |
| what are examples were we use access control to allow access | might want to give a user access to a file might want to give an entire group of people access to all the files in a given directory might allow someone physical access to a resource by giving ur employees a key/badge to your facility |
| what is denying access | is the opposite of granting access. |
| what happens when you deny access | you're preventing a given party from accessing the resource in question |
| what are examples where we use access control to deny access | might deny access to a person attempting to log onto a machine based on the time of day might block unauthorized individuals from entering the lobby of your building beyond business hours |
| what are many access control systems set to by default | set to deny |
| what is limiting access | is allowing only some degree of access to your resources |
| what is an example of limiting access in a physical security scheme | you might have a master key that can open any door in the building an intermediate key that can open only a few doors a low level key that can open only one door |
| when else might you limit access | when you're using applications that may be exposed to attack prone environments |
| what are examples of applications that ight be exposed to attack prone environments | web browsers used on the internet |
| what is a one way to limit access | is by running sensitive applications in sandboxes |
| what are sandboxes | isolated environments containing a set of resources for a given purpose |
| what do we use sandboxes for | to prevent their contents from accessing files, memory, and other system resources with which they shouldn't be interacting |
| what is a sandbox | is an isolated environment that protects a set of resources |
| what can sandboxes be useful for | containing things that you can't trust |
| what are examples of things that you can't trust that sandboxes are useful for | code from public websites |
| what is an example of a sandbox commonly used to run programs | the Java Virtual Machine (JVM) run programs written in the Java programming language |
| what is the JVM specifically constructed for | to protect users against potentially malicious downloaded software |
| what is revoking access? | is taking access away from a party after you've granted it. |
| what is vital to the security of your system | being able to revoke access |
| what is an example of an instance where revoking access is vital to your security system | if you fire an employee you'd want to revoke any access they might have (access to email account, u'r virtual private network (VPN), u'r facility) |
| when working with computer resources it may be particularly important to | be able to revoke access to a given resource quickly |