Design of protection mechanisms Flashcards

1
Q

Access

A

The ability to make use of information stored in a computer system. Used frequently as a verb, to the horror of grammarians.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

authenticate

A

To verify the identity of a person (or other entities external to the protection system) making a request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

authorize

A

To grant a principle access to certain information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

capability

A

In a computer system, an unforgeable ticket, which when presented can be taken as incontestable proof that the presenter is authorized to have access to the object named in the ticket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

certify

A

To check the accuracy, correctness, and completeness of a security or protection mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Complete Isolation?

A

A protection system that seperates principles into compartments between which no flow of information or control is possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Confinement?

A

Allowing a borrowed program to have access to data, while ensuring the program cannot release information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

descriptor

A

a protected value which is (or leads to) the physical address of some prtotected object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Discretionary

A

In contrast with non discrestionary, controls on access to an object that may be changed by the creator of the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Domain

A

The set of objects that may be directly accessed by a principle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encipherment

A

the usually reversible scaling of data according to a secret transformation key, so as to make it safe for transmission or storage in a physically unprotected environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does it mean to Grant?

A

to grant is to authorize.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hierarchical Control

A

Referring to ability to change authorization, a scheme in which the record of each authorization is controlled by another authorization, resulting in a hierarchicical tree of authorizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List Oriented

A

Used to describe a protection system in which each protected object has a list of authorized principals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password

A

A Secret character string used to authenticate the claimed identity of an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

permission

A

A particular form of allowed access, e.g, permission to READ as contrasted with permission to write.

17
Q

What is a prescript?

A

A prescript is a particular rule that must be followed before access to an object is permitted, thereby intoducing an opportunity for human judgement about the need for access, so that abuse of the access is discouraged.

18
Q

Principal

A

The entity in a computer system to which authorizations are granted; thus the unit of accountability in a computer system.

19
Q

privacy

A

The ability of an individual or organizations to decide whether, when and to whom personal or organizational information is released.

20
Q

Propagation

A

When a principal, having been authorized access to some object in turn authorized access to another principal.

21
Q

Protected Object

A

A Data structure whose existence is know, but whose internal organization is not accessible, except by invoking the protected subsystem(q.v.) that manages it.

22
Q

Protected Subsystem.

A

A collection of procedures and data objects that is encapsulated in a domain of its own so that the internal structure of a Data object is accessible only to the procedures of the protected subsystem and the procedures may be called only at the designated domain entry points.

23
Q

protection

A

1) security (q.v.)
2) Used more narrowly to denote mechanisms and techniques that control the access of executing programs to stored information.

24
Q

Revoke

A

To take away previously authorized access from some principal.

25
Q

With respect to information processing systems, what is security?

A

mechanisms and techniques to control who may use or modify the computer or the information stored on it

26
Q

self control

A

Referring to ability to change authorization, a scheme in which each authorization contains within it the specification of which principals may change it.

27
Q

Ticket oriented

A

Used to describe a protection system in which each principal maintains a list of unforgeable bit patterns, called tickets, one for each object the principal is authorized to have access.

28
Q

User

A

Used imprecisely to refer to the individual who is accountable for some identifiable set of activities in a computer system.