Different systems for data protection Flashcards
(43 cards)
What is Access control?
Security system which constraints the actions preformed in a system based on access control rules
What is the basic premise of DAC?
Permissions assigned at discretion of resource owner
What are the benefits of DAC?
Highly flexible
control access to files
control sharing of personal info
What is a Harison-Ruzzo-Ullman (HRU) model?
DAC model that has explicity state changes by commands (create, confer, revoke, transfer)
What are the weaknesses of DAC?
Only a constraint on DIRECT access
info can be read from file and copied to another
- trojan horse: also if you trust a subject a trojan horse can copy info to a file readable by attacker
What is the basic premise of MAC?
Access rights entirely by system
What are the benefits of MAC?
Useful for organizations with strong need for central control
What is BLP?
A MAC MLS model focused on confidentiallity
No read up
No write down
What are BLP limitations?
only limit access and sharing (no integrity)
fixed rights -> Classes of S & O do not change
no model for access management or policy making
What is strong and weak tranquility property?
Strong: S & O do not change class during system lifetime
Weak: S&O only change labels if it does not violate spirit of security policy
What is MLS?
access based on security classes for objects and subjects
What is the goal of MLS?
ensure that info does not flow to unauthorized subjects?
What is BIBA?
A MAC MLS model that defines mandatory policies for integrity
No read down
No write up
What is the goal of BIBA?
prevent information flow to higher or incomparable security classes
What is Multilateral security?
Protect data from leakage between compartments on the same level (compartmentalization)
What is the chinese wall?
Dynamic separation of duty model that splits company info into objects, company datasets, and conflict of interest classes
What are the rules in chinese wall?
Read only for one company in conflict class
Write if read & no info from companies of same conflict class (or just no unsanitized data from same conflict class)
What is a reputation based trust management system?
Decides trust level on experiences
Needs good implementation for market to flourish
What is rule based trust management?
Trust given if subject has the correct credentials
Problems -> a lot of credentials to check, mention, and store
What is RBAC?
Access control model based on roles that have certain permissions
What are the benefits of RBAC?
Increases scalability and flexibility
reduced administration error & cost
easy to meet new requirements
What are the security principles of RBAC?
Least privilage -> No more privileges than necessary for job
Separation of duties -> prevent users from abusing positions (more than 1 user needed for critical task)
State differences of RBAC 0, 1, 2, 3
0: core
1: core + role hierarchies
2: core + constraints
3: core + 1 + 2
What is static separation of duty?
RBAC 2 restriction of permissions assigned to user