Access Control Flashcards
What are the 3 fundamental categories of security techniques?
proactive, real-time, reactive
What 3 entities underlie the design of secure computer systems?
reference monitor, reference validation mechanism, trusted computing base
What are the principals of a reference monitor?
the users
what is a capability?
communicable, unforgeable token of authority
how do we enforce policies?
reference monitor implemented as controls
Where should you put access control mechanisms?
everywhere
what are the 3 reference monitor placement types?
stacked, sandbox, embedded
What is the stacked placement type? Give an example.
Where the RM is part of the interface between user space and OS.
example: all modern OS
What is the sandbox placement type? Give an example.
the program is executed in an RM-controlled environment.
example: interpreted language (Java)
What is the embedded placement type? Give an example.
the RM is a subcomponent of the program.
example: SQL engine
what are some reasons for a hardware-near security kernel?
- all mechanisms can be compromised from the layer below
- the lower the level, the harder to bypass
- the lower the level, the simpler the code
- hardware offers best performance for specialized checks
- higher level of assurance with smaller overhead
What are the 4 categories for requirements for OS security/
- execution domains
- process separation
- memory protection
- input/output controls
OS is both ___?___ and ___?___
arbitrator of access requests
object of access control
should users ever be able to modify the OS?
no
what is the classic distinction?
user mode vs supervisor mode