Different systems for data protection Flashcards
What is Access control?
Security system which constraints the actions preformed in a system based on access control rules
What is the basic premise of DAC?
Permissions assigned at discretion of resource owner
What are the benefits of DAC?
Highly flexible
control access to files
control sharing of personal info
What is a Harison-Ruzzo-Ullman (HRU) model?
DAC model that has explicity state changes by commands (create, confer, revoke, transfer)
What are the weaknesses of DAC?
Only a constraint on DIRECT access
info can be read from file and copied to another
- trojan horse: also if you trust a subject a trojan horse can copy info to a file readable by attacker
What is the basic premise of MAC?
Access rights entirely by system
What are the benefits of MAC?
Useful for organizations with strong need for central control
What is BLP?
A MAC MLS model focused on confidentiallity
No read up
No write down
What are BLP limitations?
only limit access and sharing (no integrity)
fixed rights -> Classes of S & O do not change
no model for access management or policy making
What is strong and weak tranquility property?
Strong: S & O do not change class during system lifetime
Weak: S&O only change labels if it does not violate spirit of security policy
What is MLS?
access based on security classes for objects and subjects
What is the goal of MLS?
ensure that info does not flow to unauthorized subjects?
What is BIBA?
A MAC MLS model that defines mandatory policies for integrity
No read down
No write up
What is the goal of BIBA?
prevent information flow to higher or incomparable security classes
What is Multilateral security?
Protect data from leakage between compartments on the same level (compartmentalization)
What is the chinese wall?
Dynamic separation of duty model that splits company info into objects, company datasets, and conflict of interest classes
What are the rules in chinese wall?
Read only for one company in conflict class
Write if read & no info from companies of same conflict class (or just no unsanitized data from same conflict class)