Page 1593 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1593

Chapter 14: Controlling and Monitoring

               Access




                1.  A discretionary access control (DAC) model allows the owner,
                    creator, or data custodian of an object to control and define access.

                    Administrators centrally administer nondiscretionary access
                    controls and can make changes that affect the entire environment.

                2.  Assets, threats, and vulnerabilities should be identified through
                    asset valuation, threat modeling, and vulnerability analysis.

                3.  Brute-force attacks, dictionary attacks, sniffer attacks, rainbow
                    table attacks, and social-engineering attacks are all known methods
                    used to discover passwords.

                4.  A salt is different for every password in a database. A pepper is the

                    same for every password in a database. Salts for passwords are
                    stored in the same database as the hashed passwords. A pepper is
                    stored somewhere external to the database such as in application
                    code or as a configuration setting for a server.
   1588   1589   1590   1591   1592   1593   1594   1595   1596   1597   1598