Authentication & Acess Control Flashcards

1
Q

What are the differences between identification and authentication?

A

When an entity identifies itself, it declares its identity

In Authentication, otherwise, the entity provides a proof that verifies its identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the factors of authentication?

A

Something that the entity knows

Something that the entity has

Something that the entity is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the examples of the to know factor of authentication?

A

Password, Bing, secret handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some examples of the to have factor of authentication

A

Door key, smart card, token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some examples of the to be factor of authentication

A

Face, voice, fingerprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages and disadvantages of the to know factor?

A

Advantages: Low-cost, easy off deployment, low technical barrier

Disadvantages: Secrets can be stolen or snooped, guest, cracked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Based on the to know factor, how do we get to meaningful counter measures against possible attacks?

A

First, we need to estimate the most likely attack in this scenario. Accordingly choose the counter measures that are worth asking user to adhere to, relating also the cost of implementing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the advantages and disadvantages of the to have factor?

A

Advantages, human factor, relatively low cost, good level of security

Disadvantages, hard to deploy, can be lost or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the advantages and disadvantages of the to be factor?

A

Advantages; high-level of security, requires no extra hardware to carry around

Disadvantages: hard to deploy, probabilistic matching, invasive measurement, can be cloned, privacy sensory, users with disabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the access control? Who does it and what are the requirements for it?

A

Access access control is a binary decision to allow or deny

The one that implement it is the reference monitor which enforces access control policies. The requirements for the reference monitor are: tamper proof, cannot be bypassed, small enough to be verified/tested

The reference monitor does therefore the authentication (verifies the identity of the user making the request) and the authorization (decision whether axis is granted or denied)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Requests to reference monitor come directly from the user or a user identity

True or false

A

False

Request to reference monitor do not come directly from user or a user identity, but from a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is called the active entity making a request within the system?

A

It is called the subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between a user and a subject?

A

A user is a person, whether a subject is a process running under a given user identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the acces control models?

A

Discretionary access control (DAC)

Mandatory access control (MAC)

Role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe how a DAC works

A

Resource owner discretionarily decides its access privileges

Off the shelf OSs implement DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give an example of a DAC

A

Stefano create a file and assign Frederico the privilege of reading it

17
Q

In the general manner, a DAC system needs to model which entities?

A

The subjects, who can exercise privileges, the objects, on which privileges are exercised, and the actions, which can be exercised

18
Q

What are the common implementations of DAC systems?

A

Reproduction of HRU models

Access matrix in the sparse matrix

Authorization table

Access control list

Capability lists

19
Q

What is the difference between access control and capability lists in the implementation of DAC systems?

A

The access control lists focus on the object, this way, each column of the table contains a subject and its possible actions for a given object listed in the lines

The capability list otherwise focused on the subject. Therefore, every subject is enumerated in a given line, and every column informs the object, and the actions the user can perform on it.

20
Q

What are the general DAC shortcomings?

A

Cannot prove safety

Control access to objects, but not to the inside object

Problems of scalability and management

21
Q

What is the main idea behind MAC systems?

A

Do not let owners assign privileges. Previlages are set by a security administrator.