2.3 Authorization and Access Control Flashcards
Discuss the difference between authorization and access control.
Authorization is determining exactly what an authenticated party can do.
Access Control are the tools and systems used to deny or allow access
What does the Brewer and Nash model protect against?
Conflicts of interest. Example is the Lawyer not having access to multiple industry info. Its a conflict of interest.
Why does access control based on the Media Access Control address of the systems on our network not represent strong security?
Because an operating systems software controls can override the network interfaces media access control list
Which should take place first, authorization or authentication?
Authentication - then authorization
What are the differences between the MAC and DAC models of access control?
DAC - discretionary access control lets the user define access. In most operating systems.
MAC -Mandatory, a separate group decides the access level. Most government systems.
The Bell–LaPadula and Biba multilevel access control models both have a primary security focus. Can these two models be used together?
Bell-LaPadula is concerned with confidentiality while Biba is concerned with data integrity. Cannot be used together because they counteract eachother in the read and write philosophies.
If you have a file containing sensitive data on a Linux operating system, would setting the permissions cause a potential security issue? If so, which portions of the CIA triad might be affected?
Which access control model could you use to prevent users from logging into their accounts after business hours?
Attribute based access control - would implement an environmental based attribute.
Explain how the confused deputy problem could allow users to carry out activities for which they are not authorized.
The software with access to resource has greater level of permission than user controlling the software. - Can happen by tricking the user into doing something they don’t realize, usually a client-side attack. examples, embedded code, click on images, pdf’s.
What are some of the differences between access control lists and capabilities?
What is a sandbox and give an example of a type.
An isolated environment that protects a set of resources. Can we used to protect against malicoous code from the internet. Java Virtual MAchine is a program.
What are the three types of permissions an access list can have?
- read
2.write - execute
What access control list combines the two techniques of filtering and limiting access by using IP address and Ports?
Firewall ACL
Firewall ACLs effectively combine IP address and port-based filtering to manage network access, ensuring that only authorized devices and services can communicate within a network.
What is cross-site request forgery?
Missuses users browser on computer by inserting code. Example, user clicks on a link or image that has embedded code and server allows access (confused deputy) and performs action since they’ve been authenticated and authorized.
Describe clickjacking or user interface readdressing.
Attacker must get control of a website and adds a layer something a user would click. executes a command