access control 2 Flashcards
remind me what’s the goal of an access control mechanism , and er also can I have 2 examples
Access control mechanisms of a system enforce security policies by ensuring the system stays within
authorized states.
• If the mechanisms fail, the system may enter into an unauthorized state.
In Unix/Linux, a user may be granted access to raw read/write to a disk. This will bypass the protection imposed by the file system access control mechanism.
• Shared memory: some systems do not clear shared memory between use, so data may be exposed to unauthorized subjects.
what is SPR
S is the set of all possible states
P is the subset of S authorised by the policies
R is the subset of S that is reachable with the security mechanism
under SPR, when is the system secure. and when is it precise.
the system is secure if R is a subset of P
the system is precise (not overprotective) if R = P
also dude just take a screenshot of the diagram.
what are the different levels of sharing
- angry kid who keeps wig
- happy kid creates copies his wig on pieces of paper and gives it out
- happy kid gives out original versions of his wig
- happy kid goes into strangers car
No sharing (complete isolation)
Sharing copies of data objects.
Sharing originals of data objects.
Sharing untrusted programs.
each level of sharing has different security problems
why do sharing problems not fall under the scope of an access control policy
it transfers information, not rights to
access objects.
• It is an information flow problem.
TROJAN HORSE. what is a horsehair wig
a wig that’s scratchy and made out of horsehair. if bucktha puts it on, it is now able to do what bucktha can do. it can destroy zhonghua. Like spyware and viruses
A Trojan Horse performs functions not described in its
(advertised) specifications.
If a Trojan Horse is executed by a principal, it will take on the privileges associated with that principal.
This is the case in Unix and Windows systems.
A Trojan Horse can misuse the rights belonging to the calling principals to copy, misuse or destroy data.
Examples: malwares, viruses, spyware, etc.
what is confinement
Even if a “borrowed” program is confined (e.g., the sandboxing mechanism in Java) so it only has limited access to objects, it can still transmit data that it receives from the calling principal.
A user downloads and executes a software for filing tax return. Suppose the software is executed in a confined environment (e.g., virtual machine in Java), with limited access to the general system.
The user still needs to provide confidential financial data for the software to process. A malicious software may leak this confidential data.
what is mutual suspicion. it’s like the piracy problem when I legally download a game but can make a pirated copy of it lol.
The borrower of the program may be worried that the program steals data.
But the owner of the program may also be worried that the program can be copied without permission.
what are the general mechanisms for access control problems
- brent gets more rights than simone
- if you buy a wig, as a thinning brent, even, you get a receipt that says you OWN it
- there’s a list of the brents who own shit
Access Hierarchies: Automatically give privileged subjects a superset of the rights of less privileged subjects
Capabilities: “Tickets” for objects; possession of a capability unconditionally
authorizes the holder access to the
object.
Access control list: Lists of subjects having access rights
to some particular objects.
what is the revocation of rights problem
Subjects may grant rights (capabilities) to other subjects; subjects may grant the right to grant rights.
In systems where rights can be transferred, revocation of rights can trigger cascading revocation
In Unix, each file has an ACL with three entries corresponding to:
- The owner’s access right
- The access rights of all users in the owner’s group
- The access rights of all others.
it’s that -rwxr-xr-r shit
okay look just look at the tutorial okay
who grants the security policies that specify how buckthas are granted access to wigs
whoever the fuck owns zhonghua, discretionary
or whoever owns all the schools bruh, like er MOE
The owner of a resource, who may decree who is allowed access; such policies are called
discretionary as access control is at the owner’s discretion.
A system-wide policy decreeing who is allowed access; such policies are called mandatory.
what is discretionary access control.
access control based on policies that refer to user identities. this is sometimes called identity based access control (IBAC)
what is mandatory access control
Access control based on policies that refer to security labels (confidential, top secret)
when are direct mappings between subjects/principals and objects impractical
In large organisations, with large number of users and objects to control