Which of the following is needed for System Accountability?
Which of the following is needed for System Accountability?
Audit mechanisms are essential for system accountability as they allow tracking of user actions. By using audit logs and other tools, user activities can be recorded and reviewed to verify the actions taken. This ensures that users can be held accountable for their behavior within the system. Documented design, authorization, and formal verification of system design do not directly contribute to tracking and verifying user actions.
What is Kerberos?
Kerberos is a trusted third-party authentication protocol. It uses secret-key cryptography and a trusted third party (the Key Distribution Center) to authenticate users and services on an unsecured network. The other options are incorrect: it is not a mythological creature (specifically from Egyptian or Greek mythology), a general security model, or a remote authentication dial-in user server (RADIUS).
The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:
The three classic ways of authenticating yourself to computer security software are by something you know, by something you have, and by something you are. 'Something you know' refers to knowledge-based authentication like passwords. 'Something you have' refers to possession-based authentication like security tokens. 'Something you are' refers to biometrics, such as fingerprints or facial recognition. Therefore, 'you are' is the correct option.
A timely review of system access audit records would be an example of which of the basic security functions?
A timely review of system access audit records would be an example of the detection function. This is because reviewing audit records allows you to identify and recognize unauthorized or suspicious activities that have already taken place. Avoidance aims to prevent risk situations from arising, deterrence seeks to discourage potential violations, and prevention involves stopping incidents before they occur. Thus, detection is the correct function associated with the review of system access audit records to identify past events.
A confidential number used as an authentication factor to verify a user's identity is called a:
A confidential number used as an authentication factor to verify a user's identity is called a Personal Identification Number (PIN). A PIN is specifically a numeric code assigned to an individual and used as a form of verification to gain access to a system. Unlike a User ID which identifies a user, or a password which can contain a combination of letters, numbers, and special characters, a PIN is strictly numeric. A challenge, on the other hand, is a prompt in a challenge-response authentication system and is not specifically a number.