Access Control Flashcards

1
Q

What is access control?

A

Control who has access to services and resources in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the forms of access control?

A

Authentication servers
Physical access control
Traffic filters
Access control lists in an OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does access to a system mean?

A

Subject, in the form of a human or process, requests a passive object (resource) with some specific access operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a reference monitor?

A

Piece of software or hardware that examines and can grant or deny the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At what level does the reference monitor support security?

A

Hardware or OS layer, a subject can be allowed to access resources and the type of access decided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of protective separation is done?

A

Physical Seperation
Logical Seperation
Temporal Seperation
Cryptographic Seperation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is physical separation?

A

Different processes use different object such as printers, files or servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is temporal separation?

A

Processes with different security requirements can only be run at separate times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is logical separation?

A

A process’s access is constrained so that it cannot access outwith its permitted domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cryptographic separation?

A

Files (data) or processes are hidden or obfuscated under cryptographic protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Unix access rights?

A

Execute, read, append, write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do some systems split their permissions into further?

A

Rename or change permissions
Create Files
Transfer
Propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Principle of Least Privilege?

A

only users that need a resource for their role should have access to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an access control list?

A

Describes the rights of subjects and objects

Works best in data-oriented systems where permissions are stored alongside the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the drawbacks of ACL?

A

Inefficient, the repetition throughout the system of values.
Checked for each file at runtime
Doesn’t scale, on change for a user has to change each and every file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is C-List used for access control?

A

No as it’s easier for an OS to control access to objects rather than users.

Despite being more efficient at runtime checking, slower in determining who has resource access

Uses PK certificates for user identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is DAC?

A

Discretionary Access Control (DAC)

Subject creates a resource it can allow access to.

User sets own protection level which is enforced by the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does strict DAC do?

A

Allows for the granting of access but not ownership to subjects. Ownership must be transferred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is MAC?

A

Mandatory Access Control is where users and resources have fixed security attributes (labels) assigned by an admin. User can access the resources with labels allowing them to.

MAC is set globally and can’t be changed.

20
Q

Can MAC be changed?

A

It can be by trusted processes, otherwise it is immutable.

21
Q

What issues do both MAC and DAC have?

A

Canceling
Adding
Merging

22
Q

How are policy conflicts dealt with?

A

Resolved by reference monitor

23
Q

What are privileges?

A

The right to exercise rights. Like groups, can be seen as an intermediate layer between objects and subjects.

24
Q

What do Reference monitors mediate access to?

A

Objects such as the kernel and physical resources.

25
Q

Where can the reference monitor be situated?

A

Access Control System
Hypervisor
In an application
In the services layer

26
Q

What is a security kernel?

A

Piece of Hardware, Software or Firmware that implements the reference monitor

27
Q

What are the conditions of the security kernel?

A

Must be tamper-proof and verifiable

28
Q

What is TCB?

A

Trusted Computer Base

Group of systems that enforce a security policy

29
Q

What is the TCB made up of?

A

Daemon, Firmware, Software Controls, Firewalls, Interrogate software, Virus Protection

These ensure correct access and correct inputs

30
Q

How s RBAC implemented?

A

At the application layer.

Functional groups or user roles based on info needed for job function.

Each role allows certain privileges.

31
Q

What are the rings of protection and what do they do?

A

Offer different levels of privilege for the users or system programs.

Ring 0: Kernel
Ring 1: Supervisor
Ring 3: User Space

32
Q

What ring changes privileges in a system?

A

Ring 0

33
Q

How can userspace programs communicate with the kernel?

A

System calls

34
Q

What forms can Windows ACL take?

A
Discretionary ACL (DACL)
Systems ACL (SACL)
35
Q

What is DACL?

A

List of access control entities (ACEs). If there are none then the object is presumed to allow full access to all subjects.

36
Q

What is an ACE?

A

Access Control Entity. Each ACE controls or monitors access to an object by a specified trustee.

Can be of type Access Denied, Access Allowed or System_Audit

37
Q

What is SACL?

A

Logs attempt to access resources.

38
Q

What is HAL?

A

Hardware Acceleration Layer

Provides an interface ot the hardware

39
Q

How is the security reference monitor run on Windows?

A

Run from the windows executive

local security authority runs at login

The security account manager keeps the user database account.

40
Q

What can subjects be in Windows?

A

Users
Domains
Groups
Machines

41
Q

What are principles made of?

A

Username

SID

42
Q

What is stored in an access token?

A

Security credentials for a process

43
Q

What are the security levels?

A

Attributes of a system, policies may consist of them.

44
Q

What type of access control does MAC use?

A

Rule BAC

45
Q

What type of access control does DAC use?

A

Identity BAC (IBAC)