Access Control Flashcards

1
Q

What is access control?

A

Control who has access to services and resources in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the forms of access control?

A

Authentication servers
Physical access control
Traffic filters
Access control lists in an OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does access to a system mean?

A

Subject, in the form of a human or process, requests a passive object (resource) with some specific access operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a reference monitor?

A

Piece of software or hardware that examines and can grant or deny the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At what level does the reference monitor support security?

A

Hardware or OS layer, a subject can be allowed to access resources and the type of access decided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of protective separation is done?

A

Physical Seperation
Logical Seperation
Temporal Seperation
Cryptographic Seperation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is physical separation?

A

Different processes use different object such as printers, files or servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is temporal separation?

A

Processes with different security requirements can only be run at separate times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is logical separation?

A

A process’s access is constrained so that it cannot access outwith its permitted domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cryptographic separation?

A

Files (data) or processes are hidden or obfuscated under cryptographic protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Unix access rights?

A

Execute, read, append, write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do some systems split their permissions into further?

A

Rename or change permissions
Create Files
Transfer
Propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Principle of Least Privilege?

A

only users that need a resource for their role should have access to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an access control list?

A

Describes the rights of subjects and objects

Works best in data-oriented systems where permissions are stored alongside the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the drawbacks of ACL?

A

Inefficient, the repetition throughout the system of values.
Checked for each file at runtime
Doesn’t scale, on change for a user has to change each and every file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is C-List used for access control?

A

No as it’s easier for an OS to control access to objects rather than users.

Despite being more efficient at runtime checking, slower in determining who has resource access

Uses PK certificates for user identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is DAC?

A

Discretionary Access Control (DAC)

Subject creates a resource it can allow access to.

User sets own protection level which is enforced by the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does strict DAC do?

A

Allows for the granting of access but not ownership to subjects. Ownership must be transferred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is MAC?

A

Mandatory Access Control is where users and resources have fixed security attributes (labels) assigned by an admin. User can access the resources with labels allowing them to.

MAC is set globally and can’t be changed.

20
Q

Can MAC be changed?

A

It can be by trusted processes, otherwise it is immutable.

21
Q

What issues do both MAC and DAC have?

A

Canceling
Adding
Merging

22
Q

How are policy conflicts dealt with?

A

Resolved by reference monitor

23
Q

What are privileges?

A

The right to exercise rights. Like groups, can be seen as an intermediate layer between objects and subjects.

24
Q

What do Reference monitors mediate access to?

A

Objects such as the kernel and physical resources.

25
Where can the reference monitor be situated?
Access Control System Hypervisor In an application In the services layer
26
What is a security kernel?
Piece of Hardware, Software or Firmware that implements the reference monitor
27
What are the conditions of the security kernel?
Must be tamper-proof and verifiable
28
What is TCB?
Trusted Computer Base Group of systems that enforce a security policy
29
What is the TCB made up of?
Daemon, Firmware, Software Controls, Firewalls, Interrogate software, Virus Protection These ensure correct access and correct inputs
30
How s RBAC implemented?
At the application layer. Functional groups or user roles based on info needed for job function. Each role allows certain privileges.
31
What are the rings of protection and what do they do?
Offer different levels of privilege for the users or system programs. Ring 0: Kernel Ring 1: Supervisor Ring 3: User Space
32
What ring changes privileges in a system?
Ring 0
33
How can userspace programs communicate with the kernel?
System calls
34
What forms can Windows ACL take?
``` Discretionary ACL (DACL) Systems ACL (SACL) ```
35
What is DACL?
List of access control entities (ACEs). If there are none then the object is presumed to allow full access to all subjects.
36
What is an ACE?
Access Control Entity. Each ACE controls or monitors access to an object by a specified trustee. Can be of type Access Denied, Access Allowed or System_Audit
37
What is SACL?
Logs attempt to access resources.
38
What is HAL?
Hardware Acceleration Layer Provides an interface ot the hardware
39
How is the security reference monitor run on Windows?
Run from the windows executive local security authority runs at login The security account manager keeps the user database account.
40
What can subjects be in Windows?
Users Domains Groups Machines
41
What are principles made of?
Username | SID
42
What is stored in an access token?
Security credentials for a process
43
What are the security levels?
Attributes of a system, policies may consist of them.
44
What type of access control does MAC use?
Rule BAC
45
What type of access control does DAC use?
Identity BAC (IBAC)