Chapter 4 - Access Control Flashcards

1
Q

What is Access Control?

A

Prevention of unauthorized use of a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 basic elements of access control?

A
  1. Subject: Entity accessing an object (user)
  2. Object: Resource being accessed (file, DB)
  3. Access Right: The way a subject can access an object (read, write, execute)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three main Access Control Policies?

A
  1. Discretionary Access Control (DAC): Owners control access to their resources
  2. Mandatory Access Control (MAC): Access is based on security classifications (Top Secret)
  3. Role-based Access Control (RBAC): Access is granted based on user’s role.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Access Matrix in DAC?

A

A grid where

Columns represent objects
Rows represent subjects
Each cells defines the access rights of the subject to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Access Control Lists (ACLs)

A

List of subjects that an object can be accessed by

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are capability lists?

A

List of objects that a subject can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an inode in Unix

A

A control structure containing file attributes, permissions and other metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 12 protection bits in Unix files

A

9 bits: Read, write, execute, permissions for owner, group and others

3 special bits:
Set UserID
Set GroupID
Sticky Bit (restricts file deletion to file owner)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Role of superuser (root) in Unix

A

Exempt from usual access restrictions

Has system-wide access

Can install software and manage users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Access Control List (ACL) in Unix

A

a modern feature allowing fine-grained permissions by assigning access to multiple users or groups for a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Mandatory Access Control (MAC)?

A

Access is determined by system-enforced security labels and classifications, often used in military settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Security Labels in MAC?

A

Labels indicating the sensitivity level of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a “Need-to-Know” Principle in MAC?

A

Access is limited to users who require it for their duties, even if they have the proper security clearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does MAC enforce classifications?

A

Classification: Sensitivity of the object
Clearance: User authorization level of subject
Dominance Rule: Access is allowed if the subject’s clearance dominates the object’s classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Role-Based Access Control (RBAC)

A

Access is granted based on roels assigned to users, rather than individual identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four entities in RBAC?

A
  1. User
  2. Role
  3. Permission
  4. Session
17
Q

What are constraints in RBAC

A
  1. Mutually Exclusive Roles (only user can assume one role from a set)
  2. Cardinality: Limits on the number of users per role
  3. Prerequisite Roles: Users must have a specific role before assuming another
18
Q

What is RBAC1?

A

It adds role hierarchies to the basic RBAC model, where roles inherit permissions from subordinate roles.

19
Q

What is RBAC2?

A

Adds constraints, such as mutually exclusiv eroles, to refine access control policies.