L8 - Access control Flashcards

1
Q

What is access control?

A

is a term for which the processs of a computes system controls interaction between user and system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is reference monitoring?

A

It’s function is to determine the validity of request from a user and returns a decision either granting or denying said request.

The request can be to read ,write or execute to a resource in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the subject?

A

It’s an entity capable of accessing objects. It’s divided into three classes:
* Owner
* Group
* World

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the object?

A

It’s a resource to which access is being controlled.
An object is used to contain and or receive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is access right?

A

It described the way a subject may access an object. Could include: read, write, execute, delete, create and search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is discretionary access control?

A

It’s a type of control where a user can pass on their privilges to other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an access control matrix?

A

Is used to describe protection state precisely by describing the rights of the subjects. And how state transitions change elements of the matrix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the disadvantages of a access control matrix?

A
  • an abstract formulation of access control
  • Not suitable for direct implementtation due to the matrix being extremely sparse.
  • Management of the matrix is likely to be extremely difficult if there are a large amount of files and users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a capability list?

A

it’s a row in an access control matrix which will indicate what access rights a certain subject has to all objects to the access control matrix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a access control list?

A

Is the column in an access control matrix, it indicates a object and it’s subjects access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is role-based access control?

A

Is control where the decisions a subject may take are based on the role that they have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cryptography?

A

It’s the study of mathematical techniques related to aspects of information security such as confindentiality, data integrity, entity authentication and data origin authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is symmetric encryption?

A

It’s a universal technique for providing confidentiality for transmitted or stored data. It uses a coventional encryption or single-key encryption. It requires a strong encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name a common cipher.

A

Caesar cipher: Moving all letters in the alphabet forward x amount of positions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly