Chapter 5 Flashcards

1
Q

What is access control?

A

Who is allowed to do what ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does access control do?

A

Access control enforces operational security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s a policy?

A

A policy specifies who is allowed to do what.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s a principle?

A

The active entity requesting access to a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s an object?

A

The resource access is requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a reference monitor?

A

Reference monitor is the abstract machine enforcing access control; guard mediating all access requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s authentication?

A

Reference monitor verifies the identity of the principle making the request. Example: user identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s authorization?

A

Reference monitor decides whether access is granted or denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

From where does request to the reference monitor come from?

A

They come from the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the subject?

A

The active entity making a request within the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define: user, user identity (principle), process (subject)

A

User: person
User identity (principle): name used in the system, possibly associated with a user.
Process (subject): running under a given user identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Principles and subjects terminology.

A

A principle is an entity that can be granted access to objects or can make statements affecting access control decisions. (Policy)
Example: user ID

Subjects operate on behalf of (human users we call) principles; access is based on the principle’s name bound to the subject in some unforgeable manner at authentication time.
Example: process (running under a user ID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s access operations?

A

Access operations vary from basic memory access (read, write) to method calls in object-oriented systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define the following access operations: access right, permission, privilege.

A

Access right: right to perform an (access) operation;

Permission: synonym to access right.

Privilege: a set of access rights given directly to roles like administrator, operator,…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can a subject do (access modes)?

A

A subject can:

  • observe an object, or
  • alter an object.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

State the access rights of the Bell-LaPadula model.

A

Execute
Read
Append (or Blind Write)
Write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List the three access operations on files.

A

Read: from a file
Write: to a file
Execute: a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List the access operations on directories.

A

Read: list contents
Write: create or rename files in the directory
Execute: search directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Where is deleting files or subdirectories is handled?

A

In the directory.

20
Q

What are the administrative access rights?

A

1) policies for creating and deleting files expressed by:
* access control on the directory (unix).
* specific create and delete rights (windows, openVMS)

2) policies for defining security settings such as access rights handled by:
* access control on the directory.
* specific rights like grant and revoke.

21
Q

Where is a policy stored?

A

Policy is stored in an access control structure.

22
Q

What can the access control structure help to do?

A

It help to capture your desired access control policy.

23
Q

What could be specified on runtime?

A

At runtime, we could specify for each combination of subject and object the operations that are permitted.
S: set of subjects
O: set of objects
A: set of access operations

24
Q

What’s the access control matrix equation? And what’s Mso?

A

M = (M so) s€S, o€O

Mso specifies the set of access operations subject s may perform on object o.

25
Q

What are the disadvantages of the Access Control Matrix?

A

1) access control matrix is an abstract concept
2) not very suitable for direct implementation
3) not very convenient for managing security

26
Q

What are the options of implementing an access control matrix?

A

Access rights can be kept with the subjects or with the objects.

27
Q

How does the access rights are kept with the subject?

A

Every subject is given a “capability”, an unforgeable token that specifies this subject’s access rights. This capability corresponds to the subject’s row in the access control matrix.
Example: Alice’s capability: edit.exe: execute; fun.com: execute, read.

28
Q

How are capabilities associated with discretionary access control?

A

When a subject creates a new object, it can give other subjects access to this object by granting them the appropriate capabilities. Also, when a subject (process) calls another subject, it can pass on its capabilities to the invoked subject.

29
Q

Where does the Access Control Lists (ACLs) store the access rights?

A

ACLs stores the access rights to an object as a list with the object itself. An ACL therefore corresponds to a column of the access control matrix and states who may access a given object.
Example: ACL for bill.doc: bill:read, write.

30
Q

To whom can the responsibility for setting policy can be assigned to?

A

1) the owner of a resource, who may decide who is allowed to access; such policies are called discretionary as access control is at the owner’s discretion.
2) a system wide policy deciding who is allowed access; such policies are called mandatory.

31
Q

What’s discretionary access control (DAC)?

A

Access control based on policies that refer to user identities. Referring to individual users in a policy works best within closed organization

32
Q

What’s mandatory access control (MAC)?

A

Access control based on policies that refer to security labels (confidential, top secret,…).

33
Q

Name an alternative to DAC.

A

Identity based access control (IBAC).

34
Q

What’s the cons of IBAC?

A

IBAC doesn’t scale well and will incur an identity management overhead.

35
Q

What’s groups?

A

Intermediate layer between users and objects.

36
Q

What can be used to handle access control exception?

A

Negative permissions.

37
Q

What’s a negative permission?

A

A negative permission is an entry in an access control structure that specifies the access operations a user is not allowed to perform.

38
Q

Define Role.

A

A role is a collection of procedures assigned to user.a user can have more than one role and more than one user can have the same role.

39
Q

Define procedures.

A

Procedures are ‘high-level’ access control methods with a more complex semantic than read or write. Procedures can only be
applied to objects of certain data types.
Example: funds transfer between bank accounts.

40
Q

Where is Role Based Access Control (RBAC) found?

A

Application level.

41
Q

What’s Role Hierarchies ?

A

Role hierarchies define relationships between roles; senior role has all access rights of the junior role.

42
Q

What are the levels of RBAC?

A

1) flat RBAC:
* users are assigned to roles,
* permissions are assigned to roles,
* users get permissions via role membership,
* support for user-role reviews.

2) hierarchical RBAC: adds support for role hierarchies
3) constrained RBAC: adds separation of duties
4) symmetric RBAC: adds support for permission-role reviews (can be difficult to provide in large distributed systems).

43
Q

What are protection rings used for?

A

Protection rings are mainly used for integrity protection.

44
Q

What’s a protection rings?

A

Each subject (process) and each object is assigned a number, depending in its importance. Numbers correspond to concentric protection rings, ring 0 in center gives highest degree of protection. If a process is assigned a number i, we say the process “runs in ring i”. Access control decisions are made by comparing the subject’s and object’s ring.

45
Q

How does policy instantiation work?

A

When developing software you will hardly know who will eventually make use of it. At this stage, security policies cannot refer to specific user identities. A customer deploying the software may know its “authorized” users and can instantiate a generic policy with their respective user identities. Generic policies will refer to ‘placeholders’ principals like owner, group, others. Reference monitor resolves values of ‘placeholders’ to user identities when processing an actual request.