access control Flashcards
authentication vs authorization vs audit
> authentication refers to the VERIFICATION of a valid user/system entity
> authorization refers to granting permissions for user/system entity to access resources
> audit refers to the process of examining and reviewing system records
what are the four access control policies
1) DAC: discretionary access control
2) MAC: mandatory access control
3) RBAC: role-based access control
4) ABAC: attribute-based access control
what is a subject and how many are there
an entity capable of accessing objects
- owner
- group
- world
access control matrix for DAC
- rows are the users (user1,user2,….,usern)
- columns are the files (file1,file2,…,filen)
- {row,column} contains the permissions-> r,w,x
access control list for DAC
- has user name at the top then a horizontal line beneath it
- beneath the horizontal lines are the access permissions->r,w,x then another horizontal line
- below the horizontal line draw an arrow that points to another list for another user
capability list for DAC
- has file name at the top then a horizontal line beneath it
- beneath the horizontal lines are the access permissions->r,w,x then another horizontal line
- below the horizontal line draw an arrow that points to another list for another file
steps triggered by an access attempt
- Sn attempts to issues a request for type a for object X
- the system generates a message to the controller for X as: {Sn,a,X}
- the controller checks the access control matrix for a in A{Sn, X}
- if true, then access is allowed
else, a warning is issued
what are inodes (index nodes)
- a data structure in a file system that stores metadata and pointers to the actual data of a file
what is stored in indes
- file attributes
- permissions
- control information
what are the fields of inodes and what do they mean
1) UID: username of owner
2) GID: group of owner
3) atime: access time
4) mtime: modification time (file content)
5) ctime: alteration time (file metadata)
6) block count: size of file
what is DAC
the resource owner has the ability to exercise control over access permissions for their resources
what is MAC
access permissions are determined and enforced by a central authority or security policy
- predefined rules
what is RBAC
access permissions are assigned based on predefined roles
access control matrix for RBAC
- rows are the users
- columns are the roles
- {row,column} = 1 or = 0 for every user