P1L5: Access Control Flashcards

1
Q

Two parts to Access Control

A
  1. Decide who should have access to certain resources. An access control policy.2. Enforcement–only accesses defined by the access control policy are granted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control Matrix (ACM)

A

Rows correspond to sources of the request (users/subjects/groups)Columns correspond to the resources that need protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Discretionary Access Control

A

Access is at the discretion of its owner. Owner can grant access to other users and also allow or not allow the other users to propagate this access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Flaw with DAC

A

Other user can copy to another file and then share with third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Control List (ACL)

A

Columns for an object that define each users rights of that object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Capability List (C-List)

A

Rows for a user that define that user’s rights for each object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where should ACL be stored?

A

–In trusted part of system–Consists of access control entries–Should be stored along with other object meta-data–Checking requires traversal of the ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where should C-List be stored?

A

–It is per user–A capability is an unforgeable reference/handle for a resource–User catalogue of capabilities defines what a certain user can access–Can be stored in objects/resources themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ACL vs C-List

A

Efficiency–ACL are not as efficient as C-ListAccountability–Can be found easily in ACL. With C-List, each user’s catalog must be checked to see if access ok.Revocation–Revoking access in ACL is easyMost OS uses ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does OS implement ACL?

A

The OS keeps track of info about each file and its metadata, called an i-node. Open files are stored in the meta-data table. The file must be active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Role Based Access Control (RBAC)

A

The access rights are associated by roles/jobs. Users can have more than one role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RBAC benefits

A

–Policy need not be updated when a certain person leaves–new employee should be able to activate the desired role.–Start with minimum accessSELinux supports RBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fail-safe defaults

A

Implies that when an access control policy is silent about access to a certain user, that access must be denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security labels indicate which system entities are eligible to access certain resources. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user may belong to multiple groups. T/F

A

True

17
Q

An access right describes the way in which a subject may access an object. T/F

A

True

18
Q

Any program that is owned by, and SetUID to, the “superuser” potentially grants unrestricted access to the system to any user executing that program. T/F

A

True

19
Q

_____ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A

Access Control

20
Q

What is Access Control?

A

It implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

21
Q

What is Authorization?

A

Authorization is the granting of a right or permission to a system entity to access a system resource.

22
Q

What is Mandatory Access Control?

A

Mandatory Access Control controls access based on comparing security labels with security clearances.

23
Q

What is a Role?

A

A role is a named job function within the organization that controls this computer system.

24
Q

What do constraints do?

A

Constraints provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.

25
Q

What is Discretionary access control?

A

Discretionary access control controls access based on the identity of the requestor and on access rules stating what requestors are or not allowed to do.

26
Q

______ access control controls access based on the identity of the requestor and on access rules stating what requestors are or not allowed to do.

A

Discretionary

27
Q

____ access control controls access based on the roles hat users have within the system and on rules stating what accesses are allowed to users in given roles.

A

Role based

28
Q

What is Role based access control?

A

Role based access control controls access based on the roles hat users have within the system and on rules stating what accesses are allowed to users in given roles.

29
Q

What are the basic elements of Access Control?

A

Subject
Object
Access Right.

30
Q

Basic access control systems typically define three classes of subject: owner, _______ and world.

A

Group

31
Q

What 3 classes of subject do Basic Access Control Systems define?

A

Owner
Group
World

32
Q

What’s the difference between Authentication and Authorization?

A

Authentication - Verification that the credentials of a user or other system entity are valid

Authorizatoin - The granting of a right or permission to a system entity to access a system resource

33
Q

What is an Access Control Matrix?

A

Matrix of who can access what. Subjects in row, objects in column

34
Q

What is a Capability List?

A

For every user, objects are listed with their access right for that user. stored in objects themselves