access control Flashcards
access control
a collection of mechanisms that work together to create security architecture to protect the assets of an information system
security policy
states who is allowed to do what
what are some examples of objects
file
directory
data
service
authorisation
checks whether a request for an object can be granted
the act of setting the security policy
reference monitor
the guard enforcing the policy
where is the access control list
attached to each object in a system
accountability
a security goal that allows actions of an entity to be tracked back to that entity
what are some benefits of accountability (3)
can investigate parties involved in a breach
can check whether an organisation is following regulations
allows for deterrence, fault isolation, intrusion detection and prevention
physical access control
using locks security guards badges etc to control people/vehicles entering a protected area via authentication and authorisation
prevents gaining physical access into the system
information/asset owner
responsible for who uses the system and how to recover it in a disaster
logical access control
prevents logical (usually remote) access via the validation of a users identity
confidentiality in CIA
protect data and personal privacy from leakage
integrity in CIA
ensure accuracy completeness consistency and validity of the organisations or a persons data
availability in CIA
data should be available when requested
in which four ways can we allocate privileges
mandatory access control
discretionary access control
the least privilege
role based access control
mandatory access control
the security policy is centrally controlled by a policy/security administrator therefore the rules are set by the system and enforced for all users
what is access based on in mandatory access control
subjects objects and labels
subjects in mandatory access control
people or other systems that are granted clearance
objects in mandatory access control
assets being protected
labels in mandatory access control
binds the object to the subject
defines whether a subject can access an object based on the labels classification
discretionary access control
decentralised
allows the object owner to grant permissions to other users
what does the access control list contain in discretionary access control
user id file names and permissions
what are some examples of permissions
read
write
update
delete
rename
execute
the least privilege
giving people the least amount of access required to do their job