2 cissp ® Official Study Guide Eighth Edition


Educate users about security



Download 19,3 Mb.
Pdf ko'rish
bet612/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   608   609   610   611   612   613   614   615   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Educate users about security.
Properly trained users have a better understanding of secu-
rity and the benefi t of using stronger passwords. Inform users that they should never share 
or write down their passwords. Administrators might write down long, complex passwords 
for the most sensitive accounts, such as administrator or root accounts, and store these 
passwords in a vault or safety deposit box. Offer tips to users on how to create strong pass-
words, such as with password phrases, and how to prevent shoulder surfi ng. Also, let users 
know the dangers of using the same password for all online accounts, such as banking 
accounts and gaming accounts. When users use the same passwords for all these accounts, 
a successful attack on a gaming system can give attackers access to a user’s bank accounts. 
Users should also know about common social-engineering tactics.
Summary 
This chapter covered many concepts related to access control models. Permissions refer to 
the access granted for an object and determine what a user (subject) can do with the object. 
A right primarily refers to the ability to take an action on an object. Privileges include both 
rights and permissions. Implicit deny ensures that access to an object is denied unless access 
has been explicitly granted to a subject. 


654
Chapter 14 

Controlling and Monitoring Access
An access control matrix is an object-focused table that includes objects, subjects, and 
the privileges assigned to subjects. Each row within the table represents an ACL for a 
single object. ACLs are object focused and identify access granted to subjects for any spe-
cific object. Capability tables are subject focused and identify the objects that subjects can 
access.
A constrained interface restricts what users can do or see based on their privileges. 
Content-dependent controls restrict access based on the content within an object. Context-
dependent controls require specific activity before granting users access.
The principle of least privilege ensures that subjects are granted only the privileges they 
need to perform their work tasks and job functions. Separation of duties helps prevent 
fraud by ensuring that sensitive functions are split into tasks performed by two or more 
employees.
A written security policy defines the security requirements for an organization, and 
security controls implement and enforce the security policy. A defense-in-depth strategy 
implements security controls on multiple levels to protect assets.
With discretionary access controls, all objects have an owner, and the owner has full 
control over the object. Administrators centrally manage nondiscretionary controls. Role-
based access controls use roles or groups that often match the hierarchy of an organiza-
tion. Administrators place users into roles and assign privileges to the roles based on jobs 
or tasks. Rule-based access controls use global rules that apply to all subjects equally. 
Mandatory access controls require all objects to have labels, and access is based on subjects 
having a matching label.
It’s important to understand basic risk elements when evaluating the potential loss from 
access control attacks. Risk is the possibility or likelihood that a threat can exploit a vul-
nerability, resulting in a loss. Asset valuation identifies the value of assets, threat modeling 
identifies potential threats, and vulnerability analysis identifies vulnerabilities. These are 
all important concepts to understand when implementing controls to prevent access control 
attacks.
Common access control attacks attempt to circumvent authentication mechanisms. 
Access aggregation is the act of collecting and aggregating nonsensitive information in an 
attempt to infer sensitive information.
Passwords are a common authentication mechanism, and several types of attacks 
attempt to crack passwords. Password attacks include dictionary attacks, brute-force 
attacks, birthday attacks, rainbow table attacks, and sniffer attacks. Side-channel attacks 
are passive attacks against smartcards.
Exam Essentials

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   608   609   610   611   612   613   614   615   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish