Different systems for data protection Flashcards

1
Q

What is Access control?

A

Security system which constraints the actions preformed in a system based on access control rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the basic premise of DAC?

A

Permissions assigned at discretion of resource owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits of DAC?

A

Highly flexible
control access to files
control sharing of personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Harison-Ruzzo-Ullman (HRU) model?

A

DAC model that has explicity state changes by commands (create, confer, revoke, transfer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the weaknesses of DAC?

A

Only a constraint on DIRECT access
info can be read from file and copied to another
- trojan horse: also if you trust a subject a trojan horse can copy info to a file readable by attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the basic premise of MAC?

A

Access rights entirely by system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits of MAC?

A

Useful for organizations with strong need for central control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is BLP?

A

A MAC MLS model focused on confidentiallity

No read up
No write down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are BLP limitations?

A

only limit access and sharing (no integrity)

fixed rights -> Classes of S & O do not change

no model for access management or policy making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is strong and weak tranquility property?

A

Strong: S & O do not change class during system lifetime

Weak: S&O only change labels if it does not violate spirit of security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is MLS?

A

access based on security classes for objects and subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the goal of MLS?

A

ensure that info does not flow to unauthorized subjects?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is BIBA?

A

A MAC MLS model that defines mandatory policies for integrity

No read down
No write up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the goal of BIBA?

A

prevent information flow to higher or incomparable security classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Multilateral security?

A

Protect data from leakage between compartments on the same level (compartmentalization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the chinese wall?

A

Dynamic separation of duty model that splits company info into objects, company datasets, and conflict of interest classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the rules in chinese wall?

A

Read only for one company in conflict class

Write if read & no info from companies of same conflict class (or just no unsanitized data from same conflict class)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a reputation based trust management system?

A

Decides trust level on experiences

Needs good implementation for market to flourish

19
Q

What is rule based trust management?

A

Trust given if subject has the correct credentials

Problems -> a lot of credentials to check, mention, and store

20
Q

What is RBAC?

A

Access control model based on roles that have certain permissions

21
Q

What are the benefits of RBAC?

A

Increases scalability and flexibility
reduced administration error & cost
easy to meet new requirements

22
Q

What are the security principles of RBAC?

A

Least privilage -> No more privileges than necessary for job

Separation of duties -> prevent users from abusing positions (more than 1 user needed for critical task)

23
Q

State differences of RBAC 0, 1, 2, 3

A

0: core
1: core + role hierarchies
2: core + constraints
3: core + 1 + 2

24
Q

What is static separation of duty?

A

RBAC 2 restriction of permissions assigned to user

25
Q

What is dynamic separation of duty?

A

RBAC 2 restriction of permissions exercized by user in a session

26
Q

What are limitations of RBAC?

A

designed for simple systems

not context aware

only permissions based on roles (can lead to role explosion)

always needs attention from administration

role design difficult and expensive

27
Q

What is ABAC?

A

Access control where many attributes for users, objects, operations, and context are evaluated against policy to see permission

28
Q

What is UCON?

A

Usage control system to combine access control, trust management, and DRM

attribute & context-based authorizations

Control before & during usage life time

29
Q

What are the data actors?

A

Data subject -> his data
Data controller -> decide data purpose and methods
Data processor -> processes data
Person in charge of processing
Data recipient -> entity whom data is disclosed to
Third party -> gets data outside subject, controller, or processor
Data protection authority

30
Q

What are the privacy principles?

A

Fair & lawfull processing -> do not intrude privacy or interfere with autonomy
Purpose specification -> collect and use data for specific purpose
consent -> only if explicit consent
minimality -> minimum collected, processed, and time for purpose
minimal disclosure -> restrict third parties
info quality -> accurate, relevant and complete
data subject control -> subject can check and influence data
sensitivity -> sensitive data stricter
info security -> security equal to risk of data

31
Q

What are the elements of privacy policies?

A

Subject
object
action
purpose
condition
obligation

32
Q

What are hippocratic databases?

A

Data bases that incorporate privacy protection by linking purpose and consent to data

Focus on limited actions performed

33
Q

What do hippocratic databases consist of?

A

Privacy policy table -> purpose, table, attribute, {external-recipients}, retention

privacy authorization table -> purpose, table, attribute, {authorized-users}

34
Q

What is purpose-based access control?

A

Access control based on if the intended purpose of collected data matches the access purpose of request

With the addition of conditions matching (certain time or location)

35
Q

What is EPAL?

A

Privacy control model for organizations to:
enforce privacy promises made to user
Detect privacy violations
safe transfers of policy protected data

36
Q

What are the elements of EPAL?

A

Vocabulary containing:
Hierarchy of users, purposes, data, actions
model for obligations

Set of rules made up from the vocabulary:
a [user] should be [allow or deny] the ability to perform [action] on [data] For [purpose] under [condition] yielding an [obligation]

37
Q

When is a policy a refinement?

A

It adds details to existing policy but does not change any rulings except if it was a scope_error or don’t care

Obligations can be made additions to but should be stated explicitly

38
Q

What is XACML?

A

A language to express access control policies, access requests, and responses

Uses ABAC
Can use RBAC for permissions

39
Q

What are the main elements of XACML?

A

Policy administration point _> makes policy
Context handler -> constructs XACML request for decision point
policy decision point -> evaluates applicable policy and makes authorization decision
policy enforcement point -> perform access control by making decision requests and enforcing authorization decisions
policy information point -> acts as source of attribute values

40
Q

What is the decision of deny overrides algorithm in order?

A
  1. deny
  2. I {DP}
    ◦ if one has I {DP}
    ◦ if one I {D} and one P or I { P }
  3. I { D }
  4. P
  5. I {P}
41
Q

What is the decision of permit overrides algorithm in order?

A
  1. p
  2. I {P D}
    ◦ If one has I {P D}
    ◦ if one I {P} and one D or I {D}
  3. I {P}
  4. D
  5. I {D}
42
Q

What combining algorithms work in D6?

A

DOV
POV

43
Q

When is a reduction safe for a certain operator?

A

If in the operator table you see that the combined sets have the same outcomes as columns