Page 279 - CISSO_Prep_ Guide
P. 279

▪  Content dependent access control:
                       •  Access based on what you need to do to
                          a record.
                       •  Often applied to DBMS (Databases).
               ▪  Constrained user interface:
                       •  Restricts users' access to functions.
                       •  Often used by evaluation software, pay
                          per view TV, public systems.
               ▪  Temporal / time-based isolation:
                       •  Each level takes a time slot (good for
                          different requirements during backups).
               ▪  Centralized access control – RADIUS, TACACS+,
                   DIAMETER.
               ▪  Decentralized access control (peer to peer,
                   workgroups).

               IPS & IDS
               •  Network-based or host-based.
               •  Signature-based / knowledge-based / pattern
                   matching / stateful machine engine OR
                   anomaly-based / behavior-based engine
                   (protocol, traffic, or statistical anomaly).


               Penetration Testing
               •  Zero-knowledge (black box); partial knowledge
                   (gray box); full knowledge (white box).
               •  External vs. Internal; blind, double-blind (both
                   sides don't know) vs. Targeted (both sides
                   know, focused objective).
   274   275   276   277   278   279   280   281   282   283   284