CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass
Showing posts with label MAC. Show all posts
Showing posts with label MAC. Show all posts

Tuesday, October 15, 2024

ExFat File System

 ExFat File System

ExFAT (Extended File Allocation Table) is a file system used for storing data on devices like flash drives, digital cameras, and mobile phones:

Storage capacity

ExFAT can store larger files than the FAT32 file system, with a 4 GB file size limit.

Compatibility

ExFAT is compatible with most Windows and Mac operating systems, though older versions may need an update.

Default file system

ExFAT is the default file system for SDXC and SDUC cards larger than 32 GB.

Other devices

ExFAT is also used in smart televisions, portable music and video players, and media centers.

Some things to keep in mind about exFAT include:

Not journaled

ExFAT is not journaled, so if you eject the drive incorrectly while reading or writing, you might lose data or corrupt the drive.

Not compatible with some older devices

ExFAT isn't compatible with some older devices.

Not suitable for intensive applications

ExFAT can have problems with intensive applications, and it can take several attempts to transfer data correctly.

Data loss

Since exFAT doesn't redundantly store master data, you should carefully remove storage media with the exFAT file system.

Sunday, May 5, 2024

Access Control Methods

 ABAC, DAC, MAC, Role-BAC, Rule-BAC

ABAC (Attribute-Based Access Control)
The most fine-grained access control.
Access is based on a combination of subject and object attributes
  • Operating system
  • IP address
  • Up-to-date patches
  • Up-to-date antimalware
  • Employee's identity
  • Time of day
  • Location
  • Type of device
DAC (Discretionary Access Control)
  • Based on the owner of the file or folder
  • The owner decides who gets access and the type of access
  • Windows, Linux, and UNIX use a DAC method
MAC (Mandatory Access Control)
  • Each object is assigned a classification label
  • Each subject is assigned a clearance level (such as Confidential, Secret, or Top Secret)
  • A subject with the label "Secret" would be unable to access "Top Secret" data as it would be above its clearance level.
  • Also, based on "Need to know," in other words, not everything will they have access to at its security level. 
RBAC (Role-Based Access Control)
  • Based on your job function (role)
  • Group-based security
  • Group examples: Accounting, HR, IT, Sales. etc
RBAC (Rule-Based Access Control)
  • System enforced rules
  • Some rule triggers the access control
  • Time of day 
  • Conditional access is a form of rule-based access control
  • UAC (User Account Control - Windows) and sudo - Linux are examples of conditional access