CompTIA Security+ Review Guide: SY0-201 (Google eBook)

Front Cover
John Wiley & Sons, Jan 13, 2011 - Computers - 288 pages
2 Reviews
This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. Youíll find this book to be essential reading if you are studying for Security+ certification and want to get up to speed on the most recent security topics. The CD-ROM contains more than 120 review questions, two bonus exams, electronic flashcards, and a searchable key term database.
  

What people are saying - Write a review

User Review - Flag as inappropriate

Access Control
Access control refers to controlling access to resources on a computer or network system. Without it, everyone would be able to access everything. Employees would be able to view
their managerís salary information, read each otherís email, and malicious individuals such as competitors would be able to dial into your remote access server and read your companyís strategic plans for the next five years. With access controls in place, users are identified, authenticated, and authorized before they can actually access resources or perform operations on a system.
In other words, access controls control which objects a subject can access. These are two key terms used in access control models and technologies. A subject is someone or something, for example, users, applications, or system process, to which access to an object is granted or denied. Examples of objects are files, printers, applications, and system processes.
Access Control Models
Access control models provide a model for developers who need to implement access control functionality in their software and devices. Instead of having to reinvent the wheel for every system and design a complex access control system, developers can write a system based on existing well thought-out models. For the Security+ exam, there are three different types of access control models, which you need to be able to explain and differentiate: MAC, DAC, and RBAC.
Discretionary Access Control (DAC)
A widely used type of access control model is Discretionary Access Control (DAC). In a DAC model, a subject has complete control over the objects that it owns and the programs that it executes. For example, user Alice owns a file called mywork.doc. She allows mywork.doc to be read by Bob and members of the Sales group and allows no one else access to it. The better implementations of DAC provide a method to grant access on a need-to-know basis by denying access to everyone by default. Access permissions must be assigned explicitly to those who need access.
Programs executed by a user will have the same permissions as the user who is executing it. This implies that the security of the system depends on the applications that are being executed and, therefore, when a security breach in an application takes place, it can affect all the objects to which the user has access. This makes DAC very vulnerable to Trojan Horses. For example, suppose subject Alice has read and write access to object file1.doc. Charlie, a malicious attacker, could write a program that creates a new object file2.doc when executed. The program would grant Alice write access and Charlie read access. Charlie can disguise the program as legitimate software and send it to Alice. When Alice runs the program, it will have the same privileges as Alice. It could copy the content from file1.doc to file2.doc, effectively exposing the content of file1.doc to Charlie. Imagine an administrator executing the program; the attacker could obtain maximum privileges, jeopardizing the security of the entire system.
Mandatory Access Control (MAC)
In Mandatory Access Control (MAC) models, the administrator manages access controls. The administrator defines a policy, which users cannot modify. This policy indicates which subject has access to which object. This access control model can increase the level of security, because it is based on a policy that does not allow any operation not explicitly authorized by an administrator. The MAC model is developed for and implemented in systems in which confidentiality has the highest priority, such as in the military. Subjects receive a clearance label and objects receive a classification label, also referred to as security levels.
In the original MAC model according to Bell and LaPadula, access rights were granted according to numeric access levels of subjects to objects that were labeled an access level. For example, an administrator has access level 65535, Alice level 100, and Guest level 1. There are two files, file1.doc has a level of 2, file2.doc a level
 

User Review - Flag as inappropriate

http://books.google.co.in/books?id=IPtl6iE56skC&printsec=frontcover

Contents

Systems Security
1
Network Infrastructure
35
Access Control
97
Assessments and Audits
133
Cryptography
153
Organizational Security
197
Appendix A About the Companion CD
225
Copyright

Common terms and phrases

About the author (2011)

James Michael Stewart, Security+, CISSP, is a full-time writer, trainer, and researcher for Impact Online, an independent courseware development company located in Austin, Texas. He has contributed to over 75 books on topics ranging from Microsoft certification to network administration to IT security. Michael provides IT instruction across the globe for various public and private organizations, and he is also a regular contributor to publications such as C|Net, InfoWorld, and Windows NT magazine.

Bibliographic information