ch 10 Access Control Methods and Models Flashcards
access control modcels
admission to more important, computer systems,
Discretionary access control (DAC
craeted by the owner they have the say as to what users can do. objects ( files prnters)
ex full control ntfs permission
Mac
set by COMPUTER . Permissions are predefined
in the MAC model
subjects (users) ojects (files, folders, hardware
devices, network connections
data labeling
subject’s label dictates its security level,
or level of trust. An object’s label dictates what level of clearance is needed to access
it, also known as a trust level
Rule-based access control (label )
comparing the
object label and the subject label.
indivvidual permissions
roleRole-based access control
controlled by the system,
works with sets of permissions,
summary acees controls models
DAC Every object in the system has an owner.
Permissions are determined by the owner.
MAC Permissions are determined by the system.
Can be rule-based or lattice-based.
Labels are used to identify security levels of subjects and objects.
RBAC Based on roles, or sets of permissions involved in an operation.
Controlled by the system.
anonymous access
control
acecss to ftp server no autheenticaion is required
implict deny
will deny users access to a resource unless they are specifically
allowed access
NTFS PERMSIIONS
Full Control ■ Modify ■ Read & Execute ■ List Folder Contents ■ Read ■ Write