Chapter 3: Authorization and Access Control Flashcards
enables us to determine, what the party in question are allowed to do (after identification and authentication
Authorization
when only the bare minimum of access to a party is allowed to ensure that it is able to perform the functionality needed of it
Principle of Least Privilege
giving particular people or set of people access to a given resource
Allowing Access
opposite of allowing access
Denying Access
allowing some access to resources, but only to a certain extent
Limiting Access
taking the access of resources away
Revoking Access
Allowing Access
Limiting Access
Denying Access
Revoking Access
Access Control
referred to as “ackles”. Controls access in the file systems on the operating system or controls the flow traffic in the networks
ACL (Access Control List)
mostly uses three permissions: read, write, and execute
File system ACLs
IP, MAC, and ports
Network ACLs
define the permissions based on a giving resource, an identity and a set of permissions
ACLs
oriented around the use of a token that controls our access
Capability-based security
based entirely on possession of the token ,and not who possesses it
Capability based security
attack common in systems that use ACLs
Confused Deputy Problem
when the software with access to a resource has a greater level of permission to access the resource that the user who is controlling the software
Confused Deputy Problem
attacks that take advantage of weaknesses in applications that are running on the computer being operated directly by the user
client-side attacks
misuses the authority of the browser on the user’s computer
CSRF(cross site request forgery)
also known as user interface redressing, that takes advantage of some of the page rendering features (new Web browser)
clickjacking