Chapter 3: Authorization and Access Control Flashcards
enables us to determine, what the party in question are allowed to do (after identification and authentication
Authorization
when only the bare minimum of access to a party is allowed to ensure that it is able to perform the functionality needed of it
Principle of Least Privilege
giving particular people or set of people access to a given resource
Allowing Access
opposite of allowing access
Denying Access
allowing some access to resources, but only to a certain extent
Limiting Access
taking the access of resources away
Revoking Access
Allowing Access
Limiting Access
Denying Access
Revoking Access
Access Control
referred to as “ackles”. Controls access in the file systems on the operating system or controls the flow traffic in the networks
ACL (Access Control List)
mostly uses three permissions: read, write, and execute
File system ACLs
IP, MAC, and ports
Network ACLs
define the permissions based on a giving resource, an identity and a set of permissions
ACLs
oriented around the use of a token that controls our access
Capability-based security
based entirely on possession of the token ,and not who possesses it
Capability based security
attack common in systems that use ACLs
Confused Deputy Problem
when the software with access to a resource has a greater level of permission to access the resource that the user who is controlling the software
Confused Deputy Problem
attacks that take advantage of weaknesses in applications that are running on the computer being operated directly by the user
client-side attacks
misuses the authority of the browser on the user’s computer
CSRF(cross site request forgery)
also known as user interface redressing, that takes advantage of some of the page rendering features (new Web browser)
clickjacking
is a model of access control based on access being determined by the owner of the resource
Discretionary access control
is a model of access control in which the owner of the resource does not get to decide who gets to access it, but instead access is decided by a group or individual who has the authority to set access on resources
Mandatory Access Control
a model of access control that is similar to MAC, however this form of the access control is based on the role the individual being granted access is performing
Role-base access control
is logically based on attribute, particular person, resource or of an environment
attribute-based access control (ABAC)
used when other access control models are not adequate
multilevel access control
a model that uses a combination of DAC and MAC and is primarily concerned with the confidentiality of the resource in question
Bell-LaPadula Model