Authorization and Access Control Flashcards

1
Q

What is Authorization?

A

The process of determining precisely what a party is allowed to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Access Control?

A

The tools and systems used to deny or allow access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of Access Controls?

A

Car keys
House keys
Building Badges
Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four basic tasks of Access Control?

A

Allowing, Denying, Limiting, and Revoking access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of Allowing Access?

A

Granting access to a file or directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of Denying Access?

A

Blocking access based on time of day or unauthorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of Limiting Access?

A

Providing limited access to certain resources, like a master key granting access only to specific areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of Revoking Access?

A

Removing access when an employee leaves a company or changes departments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Access Control List (ACL)?

A

A list containing information about what kind of access a party has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are common network ACL attributes?

A

MAC address, IP address, Ports, and Sockets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Confused Deputy Problem?

A

A vulnerability where software has more access permissions than the user controlling it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is CSRF (Cross-Site Request Forgery)?

A

An attack that misuses the authority of a browser to execute unintended actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Clickjacking?

A

An attack that replaces existing links on a website to trick users into performing unintended actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do Capabilities differ from ACLs?

A

Capabilities are token-based access control methods that eliminate the Confused Deputy Problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Discretionary Access Control (DAC)?

A

The resource owner decides who gets access and at what level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an example of DAC?

A

Microsoft SharePoint, where the owner controls access to files.

17
Q

What is Mandatory Access Control (MAC)?

A

A separate authority (not the owner) determines access based on security labels.

18
Q

What is an example of MAC?

A

Government organizations using Top Secret, Secret, Confidential, and Public classifications.

19
Q

What principle is associated with MAC?

A

The Principle of Least Privilege (PoLP), where users get only the access they need.

20
Q

What is Rule-Based Access Control?

A

Access is granted based on predefined system rules, such as firewall ACLs.

21
Q

What is Role-Based Access Control (RBAC)?

A

Access is determined by the user’s role in an organization.

22
Q

What is an example of RBAC?

A

A data entry clerk only has access to the file they need to edit.

23
Q

What is Attribute-Based Access Control (ABAC)?

A

Access is based on user, resource, or environmental attributes.

24
Q

What is an example of Subject Attributes in ABAC?

A

Height restrictions on amusement park rides or CAPTCHA verification.

25
Q

What is an example of Resource Attributes in ABAC?

A

Software that only runs on specific operating systems.

26
Q

What is an example of Environmental Attributes in ABAC?

A

Access restrictions based on time or location.

27
Q

What is Multilevel Access Control?

A

A combination of multiple access control models.

28
Q

What is the Bell-LaPadula Model?

A

A model combining DAC and MAC, focused on confidentiality.

29
Q

What are the two main rules in the Bell-LaPadula Model?

A

Simple Security Property (No Read Up) and * Property (No Write Down).

30
Q

What is the Biba Model?

A

An integrity-focused model that prevents unauthorized data modification.

31
Q

What are the two main rules in the Biba Model?

A

Simple Integrity Axiom (No Read Down) and * Integrity Axiom (No Write Up).

32
Q

What is the Brewer and Nash Model?

A

Also called the “Chinese Wall Model,” it prevents conflicts of interest.

33
Q

What are Physical Access Controls?

A

Methods to control the movement of people and vehicles in a secure area.

34
Q

What are examples of Physical Access Controls?

A

Access cards, security guards, biometric scanners.

35
Q

What is Tailgating in Physical Security?

A

When an unauthorized person follows an authorized person through a secured entry point.