Chapter 3: Authorization and Access Control Flashcards

1
Q

enables us to determine, what the party in question are allowed to do (after identification and authentication

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when only the bare minimum of access to a party is allowed to ensure that it is able to perform the functionality needed of it

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

giving particular people or set of people access to a given resource

A

Allowing Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

opposite of allowing access

A

Denying Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

allowing some access to resources, but only to a certain extent

A

Limiting Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

taking the access of resources away

A

Revoking Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allowing Access

Limiting Access

Denying Access

Revoking Access

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

referred to as “ackles”. Controls access in the file systems on the operating system or controls the flow traffic in the networks

A

ACL (Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

mostly uses three permissions: read, write, and execute

A

File system ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP, MAC, and ports

A

Network ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

define the permissions based on a giving resource, an identity and a set of permissions

A

ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

oriented around the use of a token that controls our access

A

Capability-based security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

based entirely on possession of the token ,and not who possesses it

A

Capability based security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

attack common in systems that use ACLs

A

Confused Deputy Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

when the software with access to a resource has a greater level of permission to access the resource that the user who is controlling the software

A

Confused Deputy Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attacks that take advantage of weaknesses in applications that are running on the computer being operated directly by the user

A

client-side attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

misuses the authority of the browser on the user’s computer

A

CSRF(cross site request forgery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

also known as user interface redressing, that takes advantage of some of the page rendering features (new Web browser)

A

clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is a model of access control based on access being determined by the owner of the resource

A

Discretionary access control

20
Q

is a model of access control in which the owner of the resource does not get to decide who gets to access it, but instead access is decided by a group or individual who has the authority to set access on resources

A

Mandatory Access Control

21
Q

a model of access control that is similar to MAC, however this form of the access control is based on the role the individual being granted access is performing

A

Role-base access control

22
Q

is logically based on attribute, particular person, resource or of an environment

A

attribute-based access control (ABAC)

23
Q

used when other access control models are not adequate

A

multilevel access control

24
Q

a model that uses a combination of DAC and MAC and is primarily concerned with the confidentiality of the resource in question

A

Bell-LaPadula Model

25
Q

How interact MAC and DAC when implemented together?

A

MAC takes precedence over

DAC, and DAC works within the access allowed by MAC permissions

26
Q

the level of access granted to an individual must be at least as high as the classification of the resource in order for the individual to be able to access it

A

the simple security property/no read up (Bell-LaPadula)

27
Q

anyone accessing a resource can only write its contents to one classified at the same level or higher

A

the * property axiom/ no write down(Bell-LaPadula)

28
Q

model of access control is primarily concerned with protecting the integrity of data, even at the expense of confidentiality

A

Biba Model

29
Q

the level of access granted to an individual must be no lower than the classification of the resource

A

the simple integrity axiom/no read down (Biba Model)

30
Q

Anyone accessing a resource can only write its contents to one classified at the same level or lower

A

the * integrity axiom/no write up (Biba Model)

31
Q

an access control model designed to prevent conflicts of interest. Commonly used in industries that handle sensitive data

A

the Brewer and Nash Model/Chinese Wall

32
Q

consists of three main classes : objects, company groups, and conflict classes

A

The Brewer and Nash model

33
Q

resources such as files or information, pertaining to a single organization

A

objects (Brewer and Nash)

34
Q

all objects pertaining to a particular organization

A

Company groups (Nash and Brewer)

35
Q

all groups of objects that concern competing parties

A

conflict classes(Nash and Brewer)

36
Q

concerned with controlling the access of individuals and vehicles

A

Physical Access Controls

37
Q

the simple security property

A

no read up

38
Q

the *property axiom

A

no write down

39
Q

the simply integrity axiom

A

no read down

40
Q

the *integrity axiom

A

no write up

41
Q

the simple security property is part of what model

A

Bell-Lapadula

42
Q

the *property axiom is part of what model

A

Bell-LaPadula

43
Q

the simple integrity axiom is part of what model

A

Biba Model

44
Q

the *integrity axiom is part of what model

A

Biba Model

45
Q

Bell-LaPadula Model

A

write up, read down (WURD)

46
Q

Bell-LaPadula

A

read up, write down (RUWD)