Access control & memory Flashcards

1
Q

What is access control?

A

a broad term that describes the administrative, physical, and technical controls that regulate the interaction between subjects and objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is access control also known as?

A

Identity and access management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a subject?

A

any active entity that requests access to a resource (an object)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of subjects (2)

A
  1. Users
  2. Processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an object?

A

a resource, a passive entity that is or contains the information that is needed by a subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of resources (3)

A
  1. files
  2. I/O
  3. database entries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is access control used for?

A

granting, preventing, or revoking access to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four stages of the access control process?

A
  1. Identification
  2. Authentication
  3. Authorisiation
  4. Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three authentication methods?

A
  1. knowlegde
  2. ownership
  3. characteristic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a type 1 error (false rejection)?

A

when a known legitimate authorised user is rejected as unknown/unauthorised user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a type 2 error (false acceptance)?

A

when an unknown/unauthorised user is authenticated as a known/authorised user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is multi-factor authentication?

A

requiring multiple independent evidences to establish identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three requirements for authentication?

A
  1. Implicit deny
  2. Neet to know
  3. Separation of duties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is implicit deny?

A

if no rule is specified for the transaction of the subject/object, the authorization policy should deny the transaction (conforming with the more general “default-safe” principle)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is meant by “need to know”?

A

a subject should be granted access to an object only if the access is needed to carry out the job of the subject (conforming with the more general “least-privilege” principle)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is “separation of duties”?

A

a single individual should not
perform all the critical- or privileged-level duties.
Important duties must be separated/divided among
several individual

17
Q

Access control models (4)

A
  1. Mandatory Access Control: MAC
  2. Discretionary Access Control: DAC
  3. Role-Based Access Control: RBAC
  4. Attribute-Based Access Control: ABAC
18
Q

Alternative name for mandatory access control (MAC)?

A

Rule-based access control

19
Q

Alternative name for discretionary access control (DAC)?

A

Identity-based access control

20
Q

What is an access control policy?

A

a specification for an access decision function

21
Q

Examples of access control policies (2)

A

Bell-LaPadula & Biba

22
Q

What does the Bell-LaPadula access control policy model guarantee?

A

Confidentiality

23
Q

What does the Biba access control policy model guarantee?

A

Data integrity

24
Q

How is access control often expressed?

A

Using an access control matrix?

25
Q

In what two ways are access control matrices implemented?

A

Access control lists & capability lists

26
Q

Why are access control matrices not the most efficient?

A
27
Q

Advantages of access controls lists over capability lists (3)

A
  1. Easier for human interpretation
  2. Easy to remove rights on a particular resource (only need to modify one list)
  3. particularly suitable when new resources may be added/removed but the users are pretty stable
  4. scale up well and work in distributed settings
28
Q

Advantages of capability lists over access controls lists (2)

A

1.

29
Q

What is Address Space Layout Randomisation (ASLR)?

A

randomizing the addresses of functions and data, specifically, the positions of the initial stack, the heap, and the libraries, between every run of the program

30
Q

What is the benefit of Address Space Layout Randomisation?

A

it becomes much harder for the attacker to exploit the system through memory corruption vulnerabilities, as it will be more difficult to predict addresses of interest for the attacker (e.g. where certain secrets are loaded, where certain libraries/shellcodes will be loaded to.)

31
Q

What is the purpose of an operating system?

A

To provide an interface between the computer users and the computer’s hardware

32
Q
A