Access Control Flashcards

1
Q

What is access control?

A

a security mechanism, ensures all accesses and actions operate within the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 parts to Access Control?

A

Authentication: • Are the principals/Subject who they claim to be? Authorization: • What should the principals/Subject be allowed to do?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 Access Control Subjects?

A
  • Users
  • Groups:
  • Roles, collection of privileges
  • Processes:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you formalize access control policies?

A

Access Control Models are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 main types of Access Control Models?

A
  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Role-Based Access Control (RBAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is DAC?

A

DISCRETIONARY ACCESS CONTROL

  • Restrict access to objects based on the identity of the subjects and a set of explicit access rules
  • Objects have owners and the owners have the ability to grant/revoke access rights for others

The simplest way of implementing DAC is using Access Control Matrix: Access Control Matrix (ACM) is easy to define and verify but it does not scale well.

Easy solution? Split ACM into Columns or Rows. If by column, then we have Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is MAC?

A

Mandatory Access Control (MAC)

• Centralized access control by means of system-wide policy.
• Access control rights are fixed by administrators.
• A group or a set of people are provided access based on the clearance
given to a specific level of access depending on the classification of
information/data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is RBAC?

A

Role-Based Access Control: Permission associated with roles and users assigned to appropriate roles.

A user can execute an operation only if there is a role
assigned to the subject.
• All user activities are carried out through operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the problems with RBAC?

A

Problem 1: Role Explosion

Problem 2: Simple RBAC has limited expressiveness

Problem 3: Separation of duty policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are security policies?

A

A level description of the Principals, Assets, and Security Properties
that must hold in the system.
• It defines what it means to be ”Secure” for a system/organization/user.
• It includes a set of requirements and a set of rules to obey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Bell-LaPadula Model (BLP)

A

Need to Know! Tranquillity - Covert Channels

A form of Mandatory Access Control (MAC) is Multi-level Security.
• Based on classification of subjects AND objects.
• Originated in World War II the classifications used are Top-Secret, Secret, Confidential (For Official Use Only, or Sensitive), Unclassified.

Limitations

It only covers READ and WRITE (not EXECUTE)

Too STRICT, a user at a higher-level cannot even send commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Integrity Policies?

A

Integrity policies focus on integrity rather than confidentiality

A higher integrity level means more confidence

A program will be executed correctly
Data is accurate, reliable and not contaminated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Biba Model?

A

NO READ DOWN (or, READ UP ONLY)

No WRITE UP (OR, WRITE DOWN ONLY)

Limitations of BLP Model:

Too STRICT, consider a USB stick

No support for confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three levels of abstraction with the Ethical Wall Policy?

A
  • Objects - such as files. Objects contain information about only one company.
  • Company groups - collect all objects concerning a company.
  • Conflict classes - cluster the groups of objects for competing companies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Ethical Wall Policy?

A

this is not an integrity policy, but an access control confidentiality policy.

The permissions change dynamically. The access rights that any subject enjoys depends on the history of past accesses.

example: if you access a file from GM, you subsequently will be blocked from accessing any files from Ford or Chrysler. You are free to access files from companies in any other conflict class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ethical Wall Policy 2 properties

A

(Ethical Wall) Simple Security Rule: A subject can be granted access to an object only if the object:
• is in the same company datasets as the objects already accessed by the subject, that is, “within the Wall,”

or
• belongs to an entirely different conflict of interest class.

(Ethical Wall) *-property: Write access is only permitted if:
• access is permitted by the simple security rule, and
• no object can be read which is:
• in a different company dataset than the one for which write access is requested,
• and contains unsanitized information.

17
Q

If the user is not the file owner, and is not in the group, then the

USER/GROUP/OTHER

A

‘other’

18
Q

—–xrwx 1 Arash guests

Everyone else besides Arash and the members of the GUESTS group can read, write, and execute the program?

True or False?

A

True

19
Q

What does the `Chmod’ command do in Unix?

A

Chmod (change mode) is used to change access permissions of files and directories

20
Q

What are the classes of users, operator, and mode supported by Chmod?

A
  • Owner
  • Group
  • Others
21
Q

Study the octal Values

A

Image attached

22
Q

What is Metasploit?

A

Metasploit is one of Kali Linux main built in tools and its free! It assists with
vulnerability and exploitation. Metasploit makes pensteting easier as it breaks
the workflow into manageable sections including Device discovery, gaining
access, collecting evidence and taking control.