Different systems for data protection Flashcards

(43 cards)

1
Q

What is Access control?

A

Security system which constraints the actions preformed in a system based on access control rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the basic premise of DAC?

A

Permissions assigned at discretion of resource owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits of DAC?

A

Highly flexible
control access to files
control sharing of personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Harison-Ruzzo-Ullman (HRU) model?

A

DAC model that has explicity state changes by commands (create, confer, revoke, transfer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the weaknesses of DAC?

A

Only a constraint on DIRECT access
info can be read from file and copied to another
- trojan horse: also if you trust a subject a trojan horse can copy info to a file readable by attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the basic premise of MAC?

A

Access rights entirely by system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits of MAC?

A

Useful for organizations with strong need for central control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is BLP?

A

A MAC MLS model focused on confidentiallity

No read up
No write down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are BLP limitations?

A

only limit access and sharing (no integrity)

fixed rights -> Classes of S & O do not change

no model for access management or policy making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is strong and weak tranquility property?

A

Strong: S & O do not change class during system lifetime

Weak: S&O only change labels if it does not violate spirit of security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is MLS?

A

access based on security classes for objects and subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the goal of MLS?

A

ensure that info does not flow to unauthorized subjects?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is BIBA?

A

A MAC MLS model that defines mandatory policies for integrity

No read down
No write up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the goal of BIBA?

A

prevent information flow to higher or incomparable security classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Multilateral security?

A

Protect data from leakage between compartments on the same level (compartmentalization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the chinese wall?

A

Dynamic separation of duty model that splits company info into objects, company datasets, and conflict of interest classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the rules in chinese wall?

A

Read only for one company in conflict class

Write if read & no info from companies of same conflict class (or just no unsanitized data from same conflict class)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a reputation based trust management system?

A

Decides trust level on experiences

Needs good implementation for market to flourish

19
Q

What is rule based trust management?

A

Trust given if subject has the correct credentials

Problems -> a lot of credentials to check, mention, and store

20
Q

What is RBAC?

A

Access control model based on roles that have certain permissions

21
Q

What are the benefits of RBAC?

A

Increases scalability and flexibility
reduced administration error & cost
easy to meet new requirements

22
Q

What are the security principles of RBAC?

A

Least privilage -> No more privileges than necessary for job

Separation of duties -> prevent users from abusing positions (more than 1 user needed for critical task)

23
Q

State differences of RBAC 0, 1, 2, 3

A

0: core
1: core + role hierarchies
2: core + constraints
3: core + 1 + 2

24
Q

What is static separation of duty?

A

RBAC 2 restriction of permissions assigned to user

25
What is dynamic separation of duty?
RBAC 2 restriction of permissions exercized by user in a session
26
What are limitations of RBAC?
designed for simple systems not context aware only permissions based on roles (can lead to role explosion) always needs attention from administration role design difficult and expensive
27
What is ABAC?
Access control where many attributes for users, objects, operations, and context are evaluated against policy to see permission
28
What is UCON?
Usage control system to combine access control, trust management, and DRM attribute & context-based authorizations Control before & during usage life time
29
What are the data actors?
Data subject -> his data Data controller -> decide data purpose and methods Data processor -> processes data Person in charge of processing Data recipient -> entity whom data is disclosed to Third party -> gets data outside subject, controller, or processor Data protection authority
30
What are the privacy principles?
Fair & lawfull processing -> do not intrude privacy or interfere with autonomy Purpose specification -> collect and use data for specific purpose consent -> only if explicit consent minimality -> minimum collected, processed, and time for purpose minimal disclosure -> restrict third parties info quality -> accurate, relevant and complete data subject control -> subject can check and influence data sensitivity -> sensitive data stricter info security -> security equal to risk of data
31
What are the elements of privacy policies?
Subject object action purpose condition obligation
32
What are hippocratic databases?
Data bases that incorporate privacy protection by linking purpose and consent to data Focus on limited actions performed
33
What do hippocratic databases consist of?
Privacy policy table -> purpose, table, attribute, {external-recipients}, retention privacy authorization table -> purpose, table, attribute, {authorized-users}
34
What is purpose-based access control?
Access control based on if the intended purpose of collected data matches the access purpose of request With the addition of conditions matching (certain time or location)
35
What is EPAL?
Privacy control model for organizations to: enforce privacy promises made to user Detect privacy violations safe transfers of policy protected data
36
What are the elements of EPAL?
Vocabulary containing: Hierarchy of users, purposes, data, actions model for obligations Set of rules made up from the vocabulary: a [user] should be [allow or deny] the ability to perform [action] on [data] For [purpose] under [condition] yielding an [obligation]
37
When is a policy a refinement?
It adds details to existing policy but does not change any rulings except if it was a scope_error or don't care Obligations can be made additions to but should be stated explicitly
38
What is XACML?
A language to express access control policies, access requests, and responses Uses ABAC Can use RBAC for permissions
39
What are the main elements of XACML?
Policy administration point _> makes policy Context handler -> constructs XACML request for decision point policy decision point -> evaluates applicable policy and makes authorization decision policy enforcement point -> perform access control by making decision requests and enforcing authorization decisions policy information point -> acts as source of attribute values
40
What is the decision of deny overrides algorithm in order?
1. deny 2. I {DP} ◦ if one has I {DP} ◦ if one I {D} and one P or I { P } 3. I { D } 4. P 5. I {P}
41
What is the decision of permit overrides algorithm in order?
1. p 2. I {P D} ◦ If one has I {P D} ◦ if one I {P} and one D or I {D} 3. I {P} 4. D 5. I {D}
42
What combining algorithms work in D6?
DOV POV
43
When is a reduction safe for a certain operator?
If in the operator table you see that the combined sets have the same outcomes as columns