Chapter 3: Authorization and Access Control Flashcards

1
Q

enables us to determine, what the party in question are allowed to do (after identification and authentication

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when only the bare minimum of access to a party is allowed to ensure that it is able to perform the functionality needed of it

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

giving particular people or set of people access to a given resource

A

Allowing Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

opposite of allowing access

A

Denying Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

allowing some access to resources, but only to a certain extent

A

Limiting Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

taking the access of resources away

A

Revoking Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allowing Access

Limiting Access

Denying Access

Revoking Access

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

referred to as “ackles”. Controls access in the file systems on the operating system or controls the flow traffic in the networks

A

ACL (Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

mostly uses three permissions: read, write, and execute

A

File system ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP, MAC, and ports

A

Network ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

define the permissions based on a giving resource, an identity and a set of permissions

A

ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

oriented around the use of a token that controls our access

A

Capability-based security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

based entirely on possession of the token ,and not who possesses it

A

Capability based security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

attack common in systems that use ACLs

A

Confused Deputy Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

when the software with access to a resource has a greater level of permission to access the resource that the user who is controlling the software

A

Confused Deputy Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attacks that take advantage of weaknesses in applications that are running on the computer being operated directly by the user

A

client-side attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

misuses the authority of the browser on the user’s computer

A

CSRF(cross site request forgery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

also known as user interface redressing, that takes advantage of some of the page rendering features (new Web browser)

A

clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is a model of access control based on access being determined by the owner of the resource

A

Discretionary access control

20
Q

is a model of access control in which the owner of the resource does not get to decide who gets to access it, but instead access is decided by a group or individual who has the authority to set access on resources

A

Mandatory Access Control

21
Q

a model of access control that is similar to MAC, however this form of the access control is based on the role the individual being granted access is performing

A

Role-base access control

22
Q

is logically based on attribute, particular person, resource or of an environment

A

attribute-based access control (ABAC)

23
Q

used when other access control models are not adequate

A

multilevel access control

24
Q

a model that uses a combination of DAC and MAC and is primarily concerned with the confidentiality of the resource in question

A

Bell-LaPadula Model

25
How interact MAC and DAC when implemented together?
MAC takes precedence over | DAC, and DAC works within the access allowed by MAC permissions
26
the level of access granted to an individual must be at least as high as the classification of the resource in order for the individual to be able to access it
the simple security property/no read up (Bell-LaPadula)
27
anyone accessing a resource can only write its contents to one classified at the same level or higher
the * property axiom/ no write down(Bell-LaPadula)
28
model of access control is primarily concerned with protecting the integrity of data, even at the expense of confidentiality
Biba Model
29
the level of access granted to an individual must be no lower than the classification of the resource
the simple integrity axiom/no read down (Biba Model)
30
Anyone accessing a resource can only write its contents to one classified at the same level or lower
the * integrity axiom/no write up (Biba Model)
31
an access control model designed to prevent conflicts of interest. Commonly used in industries that handle sensitive data
the Brewer and Nash Model/Chinese Wall
32
consists of three main classes : objects, company groups, and conflict classes
The Brewer and Nash model
33
resources such as files or information, pertaining to a single organization
objects (Brewer and Nash)
34
all objects pertaining to a particular organization
Company groups (Nash and Brewer)
35
all groups of objects that concern competing parties
conflict classes(Nash and Brewer)
36
concerned with controlling the access of individuals and vehicles
Physical Access Controls
37
the simple security property
no read up
38
the *property axiom
no write down
39
the simply integrity axiom
no read down
40
the *integrity axiom
no write up
41
the simple security property is part of what model
Bell-Lapadula
42
the *property axiom is part of what model
Bell-LaPadula
43
the simple integrity axiom is part of what model
Biba Model
44
the *integrity axiom is part of what model
Biba Model
45
Bell-LaPadula Model
write up, read down (WURD)
46
Bell-LaPadula
read up, write down (RUWD)