access control 1 Flashcards
what is a security policy
a statement of what is and what is not allowed
Policy: A student is not allowed to sit in an exam on behalf of another student
what is a security mechanism
a method or tool or procedure for enforcing a security policy
• Mechanism: ID check during exam
what is principal and object in access control. what is bucktha seelan and a wig.
The active entity requesting access to a resource is called principal.
The resource that access is requested for is called object.
what is the reference monitor. what is a referee that looks like a Picasso painting that’s in a class taking care of bucktha seelans
abstract machine enforcing access control; and mediating all access requests. The referee decides whether or not this or that bucktha seelan can enter
in the study of computer security, what is the distinction between policy and mechanism=. when you give a paper ( rock paper scissors) to a police he turns into a machine.
apps have specifiic security requirements»_space;» that are specified as security policies that are enforced by security mechanisms.
paper > police > machine.
elaborate on what does reference monitor do 1
Reference monitor verifies the identity of the principal making the request.
Reference monitor decides whether access is granted or denied.
elaborate on what does reference monitor do 2
Reference monitor has to find and evaluate the security policy relevant for the given request.
“Easy” in centralized systems, but in distributed systems,
how to find all relevant policies?
how to make decisions if policies may be missing?
Referee has to find the policeman that’s needed to recognise that bucktha seelan’s demands. IN zhonghua, that’s fine.
Across different bucktha seelans in all primary schools, that’s difficult.
process of authentication. 6 steps.
- put in your pass. and your username don’t make it lame
- and if it’s right you’reauthen-ticat-ed for the night
- I’ll run for you
- I’ll make a little process with the rights for you
security’s issues that you’re not sure exactly what I do
distinguish between user, user identity and process
user is a person
user identity is the principal (name used in a system, possibly associated with the user),
process is a subject, which is running under a given user identity
elaborate on requests in access control
requests to the refence monitor don’t come directly from a user or their identity, but from a process.
In the language of access control, the process speaks for the user (identity)
the active entity making a request within the system is called the subject
TLDR: the microphone speaks for seelan
tell me more about principals and subjects
A principal is an entity that can be granted access to objects or can make statements affecting access control decisions.
• Example: user ID
Subjects operate on behalf of (human users we call) principals; access is based on the principal’s name bound to the
subject in some unforgeable manner at authentication time.
Example: process (running under a user ID)
The microphone looks like seelans and speaks for him, kinda looks like him and is also bald
what is the wig
the object, passive entity, either a file or resource
what are access operations
: Vary from basic memory access (read, write) to method calls in object-oriented
systems.
Comparable systems may use different access operations or attach different meanings to operations which appear to be the same
what is the access right
the right to perform an access operation
what is a permission
synonym for access right