Chapter 4 Flashcards

1
Q

Measures that implement, assure security services in computer system

A

Access Control Principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Controls access based on the identity of requestor and on access rules (authorizations)

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Controls access based on roles that users have within system and on rules stating what accesses are allowed to users in given roles

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Controls access based on comparing security labels with security clearances

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Controls access based on attributes of the user, the resource to be accessed, and current environmental conditions

A

Attribute-Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Entity capable of accessing objects:

  • Owner
  • Group
  • World
A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Resource to which access is controlled

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describes way in which a subject may access an object

A

Access Right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Scheme in which an entity may enable another entity to access some resource

A

DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Set of objects together with access rights to those objects
  • More flexibility when associating capabilities with protection domains
  • in terms of the access matrix, a row defines a protection domain
A

Protection Domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Control structures with key information needed for a particular file
  • Several file names may be associated with single inode
  • active inode is associated with a single inode
A

UNIX files are administered using inodes (index nodes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

May contain files and or other directories

Contains file names plus pointers to associated inodes

A

Directories are structured in a hierarchical tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Unique user ID #
  • Member of primary group identified by group ID
  • Belongs to specific group
  • 12 protection bits
A

UNIX File Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Set UID
Set Group ID (GID)
Sticky bit - when applied to a directory it specifies that only owner of any file in directory can rename, move, delete that file
Superuser - exempt from usual access control restrictions, system-wide access

A

Traditional UNIX File Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FreeBSD - Setfacl command assigns a list of UNIX user IDs and groups
- Any number of users and groups can be associated with a file

A

Access Control Lists (ACL) in UNIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Provide a means of adapting RBAC to specifics of administrative, and security policies of an organization

A

Constraints - Role Based Access Control

17
Q
  • user can only be assigned to 1 role in set( during a session or statically)
  • any permission (access right) can be granted to 1 role in set
A

Mutually exclusive roles

18
Q

Setting max # with respect to roles

A

Cardinality

19
Q

Dictates user can only be assigned to particular role if its alrdy assigned to some other specified role

A

Prerequisite roles

20
Q
  • Can define authorizations that express conditions on properties of both the resource and subject
  • Strength is its flexibility and expressive power
  • considerable interest in applying the model to cloud services
A

Attribute Based Access Control (ABAC)

21
Q
  • subject is an active entity that causes info to flow among objects or changes
  • attributes define identity and characteristics of subject
A

Subject attributes (ABAC)

22
Q
  • object is a passive info system-related entity containing/ receiving info
A

Object attributes ABAC

23
Q
  • Describe operational, technical, situational environment in which info access occurs
A

Environment attributes ABAC

24
Q

Policy is set of rules & relationships that govern allowable behavior within organiztion
- based on privileges of subjects and how resources are to be protected under

A

ABAC policies

25
Q

Comprehensive approach to managing and implementing digital identities, credentials, access control

A

Identity, Credential, and Access Management (ICAM)

26
Q

Concerned with assigning attributes to a digital identity and connecting that digital identity to an individual or NPE

A

Identity Management

27
Q

Management of the life cycle of the credential

  • Encompasses 5 logical components:
  • authorized individual sponsors an individual/entity
  • enrolls for credential
  • cred. is produced
  • cred. issued to individual
  • maintained over its life cycle
A

Credential Management

28
Q

Deals with management/control of ways entities are granted access to resources
- covers both logical and physical access

A

Access management

29
Q

Concerned with defining rules for a resource that requires access control
- rules would include credential requirements

A

Resource Management (Enterprise-wide access control facility)

30
Q

Concerned with establishing/ maintaining entitlement or privilege
- Attributes represent features of individual that can be used as basis for determining access decisions

A

Privilege Management (Enterprise-wide access control facility)

31
Q

Governs what is allowable and unallowable in access transaction

A

Policy management (Enterprise-wide access control facility)

32
Q

Term used to describe technology, standards, policies, process that allow an organization to trust digital identities, identity att., cred.

A

Identity Federation

33
Q

OpenID - open standard that allows users to be authenticated by certain cooperating sites
OIDF - international nonprofit org of individual committed to enabling OpenID tech.
ICF - Information Card Foundation - is nonprofit to evolve IC ecosystem
OITF - Open Identity Trust Framework standardized developed jointly by OIDF ICF
OIX - Exchange Corp an independent, neutral, international provider of cert trust framewrk confrom to OITF
AXN - Attribute Exchange Network online Internet-scale gateway for identity service

A

Open Identity Trust Framework