Implimenting Access Controls Flashcards

1
Q

Mandatory access Control

A

Government entity or company controls how their data is shared.

Ex: hospital owns patient records and limits their sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is Mandatory Access Control normally used

A

Has a central authority that maintains access control and sets the rules
Used in secure systems government and military or private sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give an example of MAC system

A

Hospitals

Regulated by hippa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Non-discretionary Access Control

A

The administration has ownership of a resource and decides how it can be shared. User has no rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give example of the model discretionary access control

A

User creating a file and allowing other users or subjects to access that file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Discretionary Access Control policy

A

Users are granted access based on predefined role user has.
Owner / creator of a file assigns permission to user or subject to access their resource **however access rights are based on rules set by the administrator. **

  • users can be organized in groups
  • permission will be assigned to a resource for that specific group
  • Not centrally managed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Role based access control

A

Access rights are defined through roll you have in your organization, Administrator determines what time of rights user has

Systems that use role based: Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Rule Based Access Control (RBAC)

A

Access is determined through system enforced rules or list of conditions

Ex: firewalls - lab network can only be accessed between 9am-6pm
Setting a rule that only chrom based browsers can be used to fill out a web based app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Data Base Security

A

When a database has their own access control. May support data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define role based Hirrarchies

A

A way of organizing roles to respect authority, responsibility, and competency

Subject to organizational policies or constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Constrained User Interface (CUI)

A

A methodology that restricts the users actions of specific functions by not allowing the user to request functions that are outside of his/her respective level of privileged role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can we use CUI to deny or allow access to system function based on user authentication and capabilities/rights.

A

Menu and shells
Database views
Physically constraining a user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Content dependent access control

A

Protects databases containing sensitive information

Permits or denies access based on the explicit content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Context based access control

A

Used in firewall applications to extend the firewall decision making process to
Decision based on state
Application later protocol session information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When would temporal isolation methodology be used?

A

Used to enhance role based access control

Bank access codes in vaults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____A human user or NPE, such as a device that issues access requests to perform operations on objects

A

Subject

17
Q

_____A system resource for which access is managed by ABAC system. Such as devices, files, records, tables, process, programs, networks, or domain containing or receiving information

A

Object

18
Q

The representation of rules or relationships that makes it possible to determine if a requested access should be allowed

A

Policy

19
Q

___are the characteristics of the subject, object, or environment conditions.

A

Attributes

20
Q

What is view based access control

A

Separates A given access control object into sub components and permits or denies access to view or interact with specific sub components

21
Q

Attribute based access control

A

Subject request to perform operations on objects granted or denied based on assign attributes of the subject assign attributes of the object environment conditions and a set of policies

22
Q

Separation of duties

A

No single individual should perform a task from beginning to end

23
Q

Explain the Bell-LaPadula Confidentiality Model

A

Confidentiality model: a given user can read data at a lower sensitivity level But not those at a higher classification level.

24
Q

Biba integrity model

A

Looks at how the data is being manipulated to ensure integrity of the information.

subject cannot read down an object at a lower integrity level

25
Q

Define Clark-Wilson integrity models

A

Normally forms an access triple
of authenticated principles
programs acting on data
And the data items in them selves

  • each triple or relation between user transaction and data item must be maintained in the system
26
Q

What are three integrity goals

A
  1. Authentication prevents authorized users from making modifications on the system
  2. Controls prevent authorize users from making improper modifications or other actions
  3. Maintains internal and external consistency through the use of well-formed transactions
27
Q

Brewer and bash model -Chinese wall

A

Uses RBAC
Defines a wall to segment data types and developed a set of rules that ensure that no subject accesses o Jeff’s on the other side of the wall

Supports separation of duties

28
Q

Graham denning model and what are their 8 protection rights

A

Primarily concerned with

  • how Subjects and objects are securely created
  • how subjects are assigned rights of privileges
  • how ownership of objects is managed
  • how objects and subjects can be securely deleted

8 protection rights

  1. Create object
  2. create subject
  3. Delete object
  4. delete Subject
  5. read access rights
  6. grant access right
  7. delete access right
  8. transfer access right