Access Control Flashcards

(28 cards)

1
Q

What is Authentication?

A

Check if something or someone is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Authorisation?

A

Permission granted to user to access resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Access Control?

A

Authenticate, Authorise and take account of the actions of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is Access Control achieved?

A

Through policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 2 places can Access Control be applied?

A

Locally, Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 2 examples of Access Control?

A

Code based approach, Database orientated approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the code-based approach to Access Control?

A

Integrating Access Control into server’s Application Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the database-orientated approach to Access Control?

A

Access Control delegated to database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 main models of Access Control?

A

1) Discretionary Access Control (DAC) 2) Mandatory Access Control (MAC) 3) Role based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are DAC, MAC and RBAC each defined by?

A

DAC = User, MAC = System, RBAC = Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In DAC, what do users own and control?

A

DAC, users own resources and control their own access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In DAC, can ownerships be shared and transferred?

A

Yes, in DAC ownership can be shared and transfered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In DAC, every object has a list, what is this called?

A

DACL (Discretionary Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the DACL contain?

A

List of people and their access permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a DAC Matrix look like?

A

Vertical list of names, horizontal list of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does MAC classify subjects and objects?

A

By security levels (e.g. confidential, secret, top secret)

17
Q

How do reading and writing permissions work in MAC?

A

Users can only read objects of equal or lower levels

18
Q

In MAC, can access be shared and transferred?

A

No, subjects can’t transfer access rights

19
Q

In MAC, what 2 details are kept about each object and user?

A

Users/Objects Clearance/Classification (e.g. top secret), and Need-to-Know/Category (e.g. Project z)

20
Q

What happens when someone tries to access an object?

A

The OS checks the User’s clearance and Need-to-Know against the object’s classification and category to decide if they get access

21
Q

In RBAC, what is access based on?

A

access is based on the user’s role in the organisation, e.g. teachers get these permissions

22
Q

How does MAC compare to DAC?

A

MAC is more rigid and more secure

23
Q

What are 2 benefits to RBAC?

A

1) Reduce user admin 2) Having a few roles and assigning them is far easier than MAC and DAC upkeep

24
Q

What does DSA stand for?

A

Data Sharing Agreements

25
What are DSAs for?
Enforce standard on how data should be accessed, shared etc
26
What are 2 dificulties of DSAs?
1) Difficult to represent DFAs 2) Rules can create conflict or inefficiency
27
What does DSA automatically do?
Decide access level, use and sharing of data
28
What 4 are prioritised by DSAs?
Data Security Requirements, User preferences, business rules, legislation requirements