2.3 Authorization and Access Control Flashcards

1
Q

Discuss the difference between authorization and access control.

A

Authorization is determining exactly what an authenticated party can do.
Access Control are the tools and systems used to deny or allow access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the Brewer and Nash model protect against?

A

Conflicts of interest. Example is the Lawyer not having access to multiple industry info. Its a conflict of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why does access control based on the Media Access Control address of the systems on our network not represent strong security?

A

Because an operating systems software controls can override the network interfaces media access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which should take place first, authorization or authentication?

A

Authentication - then authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the differences between the MAC and DAC models of access control?

A

DAC - discretionary access control lets the user define access. In most operating systems.
MAC -Mandatory, a separate group decides the access level. Most government systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Bell–LaPadula and Biba multilevel access control models both have a primary security focus. Can these two models be used together?

A

Bell-LaPadula is concerned with confidentiality while Biba is concerned with data integrity. Cannot be used together because they counteract eachother in the read and write philosophies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you have a file containing sensitive data on a Linux operating system, would setting the permissions cause a potential security issue? If so, which portions of the CIA triad might be affected?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which access control model could you use to prevent users from logging into their accounts after business hours?

A

Attribute based access control - would implement an environmental based attribute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain how the confused deputy problem could allow users to carry out activities for which they are not authorized.

A

The software with access to resource has greater level of permission than user controlling the software. - Can happen by tricking the user into doing something they don’t realize, usually a client-side attack. examples, embedded code, click on images, pdf’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some of the differences between access control lists and capabilities?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a sandbox and give an example of a type.

A

An isolated environment that protects a set of resources. Can we used to protect against malicoous code from the internet. Java Virtual MAchine is a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three types of permissions an access list can have?

A
  1. read
    2.write
  2. execute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What access control list combines the two techniques of filtering and limiting access by using IP address and Ports?

A

Firewall ACL

Firewall ACLs effectively combine IP address and port-based filtering to manage network access, ensuring that only authorized devices and services can communicate within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cross-site request forgery?

A

Missuses users browser on computer by inserting code. Example, user clicks on a link or image that has embedded code and server allows access (confused deputy) and performs action since they’ve been authenticated and authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe clickjacking or user interface readdressing.

A

Attacker must get control of a website and adds a layer something a user would click. executes a command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ and ________ are two main methods of Implementing access controls.

A

Access control lists (ACLs) and capabilities

17
Q

Network ACLs filter access based on ______ ______ Permissions are usually _______ (allow or deny).

A

network identifiers
binary

18
Q

_______ define permissions based on a user’s token or key. They can protect against ______ ______ attacks.

A

Capabilities
confused deputy

19
Q

What does the Bell - LaPadula Access control entail?

A

Combination of DAC and MAC. Primarily concerned with the confidentiality of the resource questioned.

20
Q

In the Bell-LaPadula access model, which direction can you read and write data.

A

When handling classified material, you cannot read items up (beyond your authorized level) and you cannot write down (Must write at the same level or above)

21
Q

The Biba Model of access control is primarily concerned with what?

A

Protecting the integrity of the data, even at the expense of confidentiality. It’s more important to keep people from altering the data than viewing it.

22
Q

How is access in the Biba access control method summarized?

A

No read down - no write up

23
Q

What is the Brewer and Nash or Chinese Wall access model designed to do?

A

To prevent conflict of interests. Used in industries that handle sensitive data, financial, medical, legal industries.

24
Q

What 3 main resource classes does the Brewer and Nash Model consider?

A
  • Objects: Resources such as files or info, pertaining to a single organization
  • Company Groups: All objects pertaining to an organization.
  • Conflict classes: All groups of objects concerning competing parties.
25
Q

What’s a common security issue with regulating people’s access into buildings?

A

tailgating. Creates an inaccurate number of people in building.

26
Q

How to solve the tailgating issue?

A

Polices that forbid it.
turnstile. Combination of solutions will work better.

27
Q

You implement _____ by using access controls

A

authorization

28
Q

What are the two access control methods?

A

access control lists
capabilities

29
Q

Which access control method safe guards against the confused deputy attack?

A

capabilities.

30
Q

What access models do industries that handle more sensitive data use (government, military, medical, legal)?

A

Multilevel access control
Bell-LaPadula, Biba, Brewer and Nash.

31
Q

Describe the Principle of Least Privilege?

A

Principle of giving a party the bare amount of privliege to do a job.

32
Q

Which phase of the incident response (IR) process includes putting the system back better than the original state?

A

Recovery
At this stage, the incident response team returns systems to normal operation. Compromised accounts are given new, more secure passwords, or replaced with a more secure access method. Vulnerabilities are remediated, functionality is tested, and normal operations resume.

33
Q

_________ are performed to ensure compliance with applicable laws, policies, and other administrative controls is being accomplished as well as detecting misuse.

A

Audits

34
Q

Permissions in network ACLs tend to be ________ in nature, consisting of _______or _______.

A

binary
deny or allow