Edit Game
Asset Control
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   21  Close
Least privilege helps prevent the compromise of this.
confidentiality, integrity and availability
These measures are put in place to prevent collusion
job rotation and mandatory vacations
Separation of duties can be bypassed by this.
collusion
Mutual exclusivity, dual control and rules all describe this.
Separation of duties
Facilities --> Network --> Desktops --> Applications --> Data are an example of this.
Physical Access
Physical access and logical access are examples of this.
layered defense
Printer, file, application, process, server, memory, building and network are all examples of these.
objects
These are active. They request service and initiate activity. They have clearance levels.
Subjects
These are passive. They respond to a request and have a classification level.
Objects
These are 3 components tied to Privilege Levels.
identify, authenticate, authorize subjects
Who determines access rules?
The owner of the asset.
Money is an example of this.
tangible asset
Reputation is an example of this.
intangible asset
Assets can fall into these two categories.
tangible and intangible
A lock on a door is an example of this.
a reference monitor
Access control must have these 2 items.
rules and logs
What is the purpose of layered defense?
to avoid a single point of failure
What are the three key components to access control?
tamper proof, always invoked, verifiable
What are subjects?
people
What is access control?
Access control is the sum total of security. It is who can gain access and what they can do when they get there.
What are objects?
assets