Access Control Flashcards

1
Q

What are the three fundamental concepts of security?

A

Confidentiality, integrity and availability, otherwise known as the CIA triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is meant by availability?

A

The availability of the software/principal being protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by integrity?

A

The integrity, or the assumed originality, of the message being recieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is meant by confidentiality?

A

The belief that the message or data has not been read or compromised by any other actors in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is authentication?

A

Authentication is the means by which we figure out if a subject is a member of an authorised party that can access an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of “something you know” in authentication?

A

A password or a PIN number that you remember

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of “something you are” in authentication?

A

Biometric characteristics, such as a facial scan or fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of “something you have” in authentication?

A

A smart card or a card reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of “context location” in authentication?

A

Being physically close to an object or physically identifiable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a “soft token” in authentication?

A

A soft token is a one-time password generated upon request to allow you to access the web application.

Soft tokens are powerful because they ensure that you know (the password), you are (being there to receive it) and you have (the device linked to the account).

Online applications tend to use this for two-factor authentication, combining your password and a soft token for a “double-layered wall”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why may biometric scans not be secure?

A

Hackers have proven already that simply being physically close to a seat the victim sat on, they can graft the fingerprints from it and replicate them to access biometric-locked data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why may RFID tags be dangerous to use in biometric authentication?

A

RFID tags solve the problem that fingerprints create, as they are stored on the body, but not in a way that can be easily grafted.

However, that difficulty to graft may inspire violent crime such as simply hacking off the entire hand/body part where the RFID is located to get access to biometrics-locked data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are access control models?

A

Access control models focus on authorisation, to specify who is allowed to do what, and how to update/change those permissions.

This may come in various forms, such as physical protection like gates/turnstiles, firewalls, memory management techniques or denial of access to files in a file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How might an access control matrix be modelled?

A

Typically, we will have a set of subjects S (e.g. {Alice, Bob}), and a set of current objects O (e.g. {file.txt, cat.png}).

The access control matrix M, then, will define the access permissions of our subjects S by the y axis, to the files O defined by the x axis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How might we scale an access control model for larger subject groups?

A

We may do this by introducing a role-based access control system, where we instead attribute each role a set of objects, and then each user may be attributed a role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Discretionary Access Control?

A

It is a model where we apply roles to the objects rather than the people themselves.

Each object is given a clearance, from:
Top Secret -> Secret -> Restricted -> Internal -> Public

Then, each user is given a clearance level corresponding to these levels.

17
Q

What is Break-Glass Access Control?

A

It’s simply a form of Discretionary Access Control that allows for overrides in dire situations.

18
Q

What is the difference between Access and Usage Control?

A

Usage control controls the use of documents rather than who can access them.

For example, you may be able to access a file, but can you write to or execute that file?