• Home
  • The Song
  • The Avatar
  • The Cat
  • Contact the Cat

Gyp the Cat dot Com

ISC(2) CISSP Revision Notes – Access Control
Revision

ISC(2) CISSP Revision Notes – Access Control

Access Control, one of the core and more important parts of the CISSP.

[alert style=”red”]In NO way should these notes be used as your sole source of study for the CISSP exam.  These notes lack things completely that could be included on your exam.  I in no way provide any guarantee or assurance that these notes are correct or satisfactory for your learning.  For further information see my CISSP Study and Exam Tips.[/alert]

ISC(2) CISSP Revision Notes – Study and Exam Tips
ISC(2) CISSP Revision Notes – Overarching Themes for the CISSP
ISC(2) CISSP Revision Notes – Access Control (You are here)
ISC(2) CISSP Revision Notes – Business Continuity and Disaster Planning
ISC(2) CISSP Revision Notes – Cryptography
ISC(2) CISSP Revision Notes – Information Security Governance and Risk Management
ISC(2) CISSP Revision Notes – Legal, Regulatory, Investigations and Compliance
ISC(2) CISSP Revision Notes – Operations Security
ISC(2) CISSP Revision Notes – Security Architectural Design
ISC(2) CISSP Revision Notes – Software Development Security
ISC(2) CISSP Revision Notes – Telecommunications and Network Security

Subject: Active party (eg user)

Object: Passive party (eg file share)

Administrative Controls:

Policies, Standards & Guidelines

  • Reviews or Audits

Technical Controls:

  • eg Encryption, audit trails

Physical Controls:

  • eg Fences, security guards

Access Control Service – AAA

  • Authentication – “Can they logon?”
  • Authorization – “What can they do?”
  • Accountability – “What did they do?”
  • (+Non-repudiation – “Was it them?”)

System Access (Outside) vs Data Access (Inside)

Factors in Authentication:

  • “Something you know” – eg password
  • “Something you have” – eg token
  • “Something you are” – eg fingerprint
  • One-factor, two-factor, three-factor

Password Controls:

Length, complexity, aging, history and logon attempts

Biometric

Type 1 Error: False Reject Rate (FRR)

Type 2 Error: False Accept Rate (FAR)

Crossover Rate (CER)

CER Seconds File Size Advantages Disadvantages
Finger Scan <1-5% 1-7 250 – 1500b Cheap Biometric can change
Hand Geometry <1-2% 3-5 ~10b Small filesize Biometric can change
Retina Pattern 1.5% 4-7 96b Obtrusive
Iris Pattern <0.5% 2.4-4 256-512b Lowest CER Obtrusive
Voice Recognition <10% 10-14 1000 – 10000b Large file size
Signature Dynamic 1% 5-10 1000 – 1500b Forgery

 

One Time Passwords (OTP): Valid for one session only

Single Sign On (SSO): Only one point of authentication for entire session (keys to the castle), based on tickets, eamples include KERBEROS, SEASEME, KrypoKnight

Centralised: eg LDAP, RAS (CHAP, PAP), RADIUS, Diameter, TACAS

LDAP: eg Microsoft Active Directory, Novell eDirectory

PAP: Two way handshake, clear text

CHAP: Three way handshake, one way hash

EAP: Various (MD5), S/Key, used in 802.11x

RADIUS: Application layer, UDP, used by ISPS and in VPNs

Tacas: Open source

Discretionary Access Control (DAC)

  • Permissions determined by the owner
  • File and data ownership (eg chmod 775)
  • Not centralized, often open by default

Mandatory Access Control (MAC)

  • Permissions determined by system/admin
  • Works with labels (eg Secret, Top Secret, etc)

Rule Based Access Control: Set by admin

Lattice Based Access Control: Upper and lower boundaries of permissions

  • Lack of flexibility and can be difficult in setting up

Bell-La Padula Confidentiality

Simple Security Property (SS Property) – No Read Up

Star Property (*-Property)- No Write Down

Biba (/Bell-La Padula Upsite Down) Integrity

Lattice based

Simple Integrity Property – No Read Down

* Integrity Property – No Write Up

Clark-Wilson Integrity

Data access through an application (think SQL Views)

Unconstrained Data Item (UDI) – Outside data

Constrained Data Item (CDI) – Inside data

Integrity Verification Procedures (IVP) – Checks CDI for validity

Transformational Procedure (TP) – Checks CDI for integrity

Non-inference Model

Can’t see actions of other on same system (objects and subjects)

Access Matric Model

DAC Extension

 

Access Control Attacks: Brute Force/Dictionary, Buffer/Stack Overflow, Man-in-the-Middle, Sniffing, Session Hijacking, Social Engineering

Access Control Testing: Pen test (port scanning, blackbox [unknown], whitebox [known], grepbox [somewhere in the middle], application scan)

[alert style=”red”]In NO way should these notes be used as your sole source of study for the CISSP exam.  These notes lack things completely that could be included on your exam.  I in no way provide any guarantee or assurance that these notes are correct or satisfactory for your learning.  For further information see my CISSP Study and Exam Tips.[/alert]

Related

Written by gyp - November 25, 2013 - 4703 Views
Tags | cissp, isc, qualification, revision, security

You Might Also Like

Enforcing Microsoft Office 365 and Azure Tennancy with McAfee Web Gateway (MWG)

May 27, 2017

Securing WordPress from Brute Force Attacks by Country Blocking on Nginx

July 11, 2015

ISC(2) CISSP Revision Notes – Information Security Governance and Risk Management

November 25, 2013

2 Comments

  • ISC(2) CISSP Revision Notes – Overarching Themes for the CISSP | Gyp the Cat dot Com November 25, 2013 at 1:47 am

    […] Study and Exam Tips ISC(2) CISSP Revision Notes – Overarching Themes for the CISSP (You are here) ISC(2) CISSP Revision Notes – Access Control ISC(2) CISSP Revision Notes – Business Continuity and Disaster Planning ISC(2) CISSP Revision […]

    Reply
  • ISC(2) CISSP Revision Notes – Study and Exam Tips | Gyp the Cat dot Com November 27, 2013 at 1:18 pm

    […] Study and Exam Tips (You are here) ISC(2) CISSP Revision Notes – Overarching Themes for the CISSP ISC(2) CISSP Revision Notes – Access Control ISC(2) CISSP Revision Notes – Business Continuity and Disaster Planning ISC(2) CISSP Revision […]

    Reply
  • Please Post Your Comments & Reviews
    Cancel reply

    Your email address will not be published. Required fields are marked *

    Previous Post
    Next Post

    Latest Posts

    • How to Convert CSV to Parquet Easily with Python on Linux Shell
    • Kusto Geolocation IP Lookup
    • Monitoring Tor Usage in Azure Sentinel, ASC, MDATP and ALA
    • HTTP to HTTPS Redirect on Azure CDN
    • Strongswan IPSec (Including Cryptomap) to Microsoft Azure Virtual Network Gateway
    • Black Ops 3 NAT Type Strict & PS4 NAT Type 3 with pfSense Fixed!
    • Sorry for the lack of posts
    • How to Block Internet Access with Group Policy (GPO)
    • Enforcing Microsoft Office 365 and Azure Tennancy with McAfee Web Gateway (MWG)
    • Scanning Subnet for Issuing Certificate Authority with OpenSSL

    Top Posts & Pages

    • How to Block Internet Access with Group Policy (GPO)
      How to Block Internet Access with Group Policy (GPO)
    • How to Configure Windows 2012 NPS for Radius Authentication with Ubiquiti Unifi
      How to Configure Windows 2012 NPS for Radius Authentication with Ubiquiti Unifi
    • Kusto Geolocation IP Lookup
      Kusto Geolocation IP Lookup
    • Tinyproxy A Quick and Easy Proxy Server on Ubuntu
      Tinyproxy A Quick and Easy Proxy Server on Ubuntu
    • Monitoring Tor Usage in Azure Sentinel, ASC, MDATP and ALA
      Monitoring Tor Usage in Azure Sentinel, ASC, MDATP and ALA
    • How to DNSPerf on Ubuntu 14.04 with Installation and Quick Start
      How to DNSPerf on Ubuntu 14.04 with Installation and Quick Start
    • How to Add Different Disclaimers using alterMIME and Postfix based on Domain
      How to Add Different Disclaimers using alterMIME and Postfix based on Domain
    • Blocking Countries on Nginx without the GeoIP Module
      Blocking Countries on Nginx without the GeoIP Module
    • How to Enable Squid Anonymous Stealth Mode
      How to Enable Squid Anonymous Stealth Mode
    • Configuring Suite B, VPN-A and VPN-B in IPSec with Strongswan
      Configuring Suite B, VPN-A and VPN-B in IPSec with Strongswan

    Tags

    apache2 azure azure log analytics blops business centos cheating cissp cloudflare cryptography dns game google gyp internet iphone ipsec isc linux mac marketing microsoft mw2 mx mysql nginx pfsense postfix proxy ps3 qualification radius revision security seo smtp socks squid ssh strongswan tinyproxy ubuntu windows 2012 wordpress xdecrypt.com
    Gyp the Cat dot Com

    Some rights retained Gyp the Cat Dot Com