Security Flashcards
Just pain and suffering really (75 cards)
What are some methods of authentication
-Something you know(Password)
-Something you are(Biometrics)
-Something you have(keycard)
-Context location(e.g current location)
Passwords are widely used but hard to remember - good passwords should be long and random. What should good systems do in regards to passwords?
They should:
-Allow passwords to be an arbitrary length
-Store passwords hashed and salted
What should good two factor authentication do?
Should combine the known and the unknown
E.g password and generated key sent via email
Why is Biometric security not that useful upon further inspection
- Once data is leaked Biometrics are useless
- No longer all that hard to replicate Biometrics
Access control models are created to ensure only certain users have access to certain features, what is an example of a simple request.
AC = subject x object x request
E.g (Will, Ecm_2426_Exam, set)
where Subject is the set of users of a system, Object is the set of resources (to which access should be controlled), and Request is the set of possible actions
(e.g., read, write) a user might want to apply to a resource
How can roles be applied to an access control module to help reduce the stress of large systems
Roles can be created, each having different permissions that allows them to do different tasks. Roles can then be applied to users who inherit their permissions, this means each user no longer needs a long list of their allowed permissions
What are the fundamental goals of information security
Confidentiality: Protecting information from disclosure to unauthorized parties.
Integrity: Protecting information from being modified by unauthorized parties.
Availability: Ensuring that information is available (accessible) to authorized parties.
(CIA triad)
Why is the CIA triad hard to implement in actuality?
A system that is very secure, preventing all access to stored information, might not have a good availability.
Define identification
Associating an identity with a subject
Define Authentication
Verifying the validity of something (usually the identity claimed by a system entity).
Define Authorization
Granting (or denying) the right or permission of a system entity
to access an object
Define Access control
Controlling access of system entities (on behalf of subjects) Access to objects based on an access control policy (“security policy”)
Name some potential issues with using passwords
-It can be hard to keep them secret when attackers are using social engineering attacks
-Users may choose passwords that are weak and easy to remember over secure passwords
Define a policy enforcement point(PEP)
The enforcement of access control happens in each layer in a component called policy enforcement point policy enforcement (PEP). For deciding if a specific request should be granted or not, the PEP contacts a (central) policy decision point (PDP) that manages and evaluates the access control policy of the system.
What is a Policy decision point (PDP)
manages and evaluates the access policy decision point (PDP) control policy of the system
What does an access control policy define?
An Access control policy defines access control policy
what is allowed (or forbidden) in a system, it is similar to a set of rules or laws
How does the Access control matrix work
The access control matrix is based on the idea of privileges of subjects on objects.
Examples for subjects, objects, and privileges are:
Subjects: users, processes, agents, groups, …
Objects: data, memory banks, other processes, files, …
Privileges: right to read, write, modify, …
How can a security policy that uses an access control matrix be described
As a table, there is a column for each file and a row for each user. The table describes the permissions that the user has and the operations they can perform on this file. However this isn’t feasible for large systems as it will grow quadratically
In Role Based Access Control(RBAC) we have this equation, what does it mean.
AC := PA ◦ UA
ROLES is the set of roles,
USERS is the set of users (subjects),
UA ⊂ USER × ROLES is a relation mapping users to their roles, and
PA ⊂ ROLES × PERMSSON is a relation mapping roles to their permissions.
How can i add hierarchies to RBAC?
To define hierarchic RBAC, we introduce a relation RH ⊂ ROLES × ROLES that defines the role hierarchy
For example RH {(lecturer, student), (demonstrator, student)}
-Demonstrator and lecturer will assume all the permissions of students
Define data classification in access control
Instead of grouping objects we group subjects with permissions
What does Break-Glass access control mean
That access control can be overridden if needed
What is Discretionary access control
Discretionary access control (DAC): owners can chance permissions
- for example Unix/Linux file system
What is usage control
Usage control is controlling how documents are used, not who can use them. E.g you can read a book but not forward it or you are allowed to watch a movie only three times a week