Access Control #1 Flashcards

(24 cards)

1
Q

What is Authentication?

A

Check if something or someone is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Authorisation?

A

Permission granted to user to access resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Access Control?

A

Authenticate, Authorise and take account of the actions of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is Access Control achieved?

A

Through policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 2 places can Access Control be applied?

A

Locally, Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 2 examples of Access Control?

A

Code based approach, Database orientated approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the code-based approach to Access Control?

A

Integrating Access Control into server’s Application Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the database-orientated approach to Access Control?

A

Access Control delegated to database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 main models of Access Control?

A

1) Discretionary Access Control (DAC) 2) Mandatory Access Control (MAC) 3) Role based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are DAC, MAC and RBAC each defined by?

A

DAC = User, MAC = System, RBAC = Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In DAC, what do users own and control?

A

DAC, users own resources and control their own access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In DAC, can ownerships be shared and transferred?

A

Yes, in DAC ownership can be shared and transfered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In DAC, every object has a list, what is this called?

A

DACL (Discretionary Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the DACL contain?

A

List of people and their access permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a DAC Matrix look like?

A

Vertical list of names, horizontal list of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does MAC classify subjects and objects?

A

By security levels (e.g. confidential, secret, top secret)

17
Q

How do reading and writing permissions work in MAC?

A

Users can only read objects of equal or lower levels

18
Q

In MAC, can access be shared and transferred?

A

No, subjects can’t transfer access rights

19
Q

In MAC, what 2 details are kept about each object and user?

A

Users/Objects Clearance/Classification (e.g. top secret), and Need-to-Know/Category (e.g. Project z)

20
Q

What happens when someone tries to access an object?

A

The OS checks the User’s clearance and Need-to-Know against the object’s classification and category to decide if they get access

21
Q

In RBAC, what is access based on?

A

access is based on the user’s role in the organisation, e.g. teachers get these permissions

22
Q

What are the 2 benefits of MAC?

A

1) Flexible 2) Little to no need of overarching admin

23
Q

What is the benefit of DAC?

A

More secure than MAC

24
Q

What are 2 benefits to RBAC?

A

1) Reduce user admin 2) Having a few roles and assigning them is far easier than MAC and DAC upkeep