Chapter 4 - Access Control Flashcards
What is Access Control?
Prevention of unauthorized use of a resource
What are the 3 basic elements of access control?
- Subject: Entity accessing an object (user)
- Object: Resource being accessed (file, DB)
- Access Right: The way a subject can access an object (read, write, execute)
What are the three main Access Control Policies?
- Discretionary Access Control (DAC): Owners control access to their resources
- Mandatory Access Control (MAC): Access is based on security classifications (Top Secret)
- Role-based Access Control (RBAC): Access is granted based on user’s role.
What is an Access Matrix in DAC?
A grid where
Columns represent objects
Rows represent subjects
Each cells defines the access rights of the subject to an object
What are Access Control Lists (ACLs)
List of subjects that an object can be accessed by
What are capability lists?
List of objects that a subject can access
What is an inode in Unix
A control structure containing file attributes, permissions and other metadata
What are the 12 protection bits in Unix files
9 bits: Read, write, execute, permissions for owner, group and others
3 special bits:
Set UserID
Set GroupID
Sticky Bit (restricts file deletion to file owner)
Role of superuser (root) in Unix
Exempt from usual access restrictions
Has system-wide access
Can install software and manage users
What is an Access Control List (ACL) in Unix
a modern feature allowing fine-grained permissions by assigning access to multiple users or groups for a file
What is Mandatory Access Control (MAC)?
Access is determined by system-enforced security labels and classifications, often used in military settings
What are Security Labels in MAC?
Labels indicating the sensitivity level of resources
What is a “Need-to-Know” Principle in MAC?
Access is limited to users who require it for their duties, even if they have the proper security clearance
How does MAC enforce classifications?
Classification: Sensitivity of the object
Clearance: User authorization level of subject
Dominance Rule: Access is allowed if the subject’s clearance dominates the object’s classification
Role-Based Access Control (RBAC)
Access is granted based on roels assigned to users, rather than individual identities