2 cissp ® Official Study Guide Eighth Edition


Identify common authorization mechanisms



Download 19,3 Mb.
Pdf ko'rish
bet613/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   609   610   611   612   613   614   615   616   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Identify common authorization mechanisms.
Authorization ensures that the requested 
activity or object access is possible, given the privileges assigned to the authenticated iden-
tity. For example, it ensures that users with appropriate privileges can access files and other 


Exam Essentials 
655
resources. Common authorization mechanisms include implicit deny, access control lists, 
access control matrixes, capability tables, constrained interfaces, content-dependent con-
trols, and context-dependent controls. These mechanisms enforce security principles such 
as the need-to-know, the principle of least privilege, and separation of duties.
Know details about each of the access control models.
With Discretionary Access 
Control (DAC) models, all objects have owners and the owners can modify permissions. 
Administrators centrally manage nondiscretionary controls. Role Based Access Control 
(RBAC) models use task-based roles and users gain privileges when administrators place 
their accounts into a role. Rule-based access control models use a set of rules, restrictions, 
or filters to determine access. The Mandatory Access Control (MAC) model uses labels to 
identify security domains. Subjects need matching labels to access objects.
Understand basic risk elements.
Risk is the possibility or likelihood that a threat can 
exploit a vulnerability and cause damage to assets. Asset valuation identifies the value of 
assets, threat modeling identifies threats against these assets, and vulnerability analysis 
identifies weaknesses in an organization’s valuable assets. Access aggregation is a type of 
attack that combines, or aggregates, nonsensitive information to learn sensitive information 
and is used in reconnaissance attacks.
Know how brute-force and dictionary attacks work.
Brute-force and dictionary attacks 
are carried out against a stolen password database file or the logon prompt of a system. 
They are designed to discover passwords. In brute-force attacks, all possible combinations 
of keyboard characters are used, whereas a predefined list of possible passwords is used 
in a dictionary attack. Account lockout controls prevent their effectiveness against online 
attacks.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   609   610   611   612   613   614   615   616   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish