Lecture 9: 9th October 2019 Flashcards
Access Control
What is access control?
How usage of a resource by users is restricted.
What are active subjects?
Humans or processes, the ones seeking to access a passive object (i.e. resource)
What are passive objects?
A resource, being accessed by an active object (i.e. a person or process)
What are reference monitors?
Software or hardware that examine and grant or deny access requests. A conceptual authoritative controller for access control policies in an OS.
What is the Trusted Computing Base?
The set of all hardware, firmware, and/or software components that are critical to the security of a computer system
What forms of separation provide protection?
physical separation – different processes use different objects such as printers, files or servers.
temporal separation – processes with different security requirements can only be run at separate times.
logical separation – a process’s access is constrained so that it cannot access outwith its permitted domain.
cryptographic separation – files (data) or processes are hidden or obfuscated under cryptographic protocols.
What are access rights?
The permissions that are granted to a user or application to read, modify, and erase files on a computer.
What are the access rights on Unix?
execute, read, append, write
What are ACLs?
Access Control List = a list of permissions attached to an object that specifies which subjects are granted access to objects, as well as what operations are allowed on given objects.
What are ACLs aka?
access permission matrices
What are some issues with ACLs?
simple but inefficient because of repetition throughout the system: at run-time, the ACLs would be checked for every file access; revoking permissions for 1 user will require a lot of searching (high complexity); so essentially not scalable or efficient
Which types of systems are ACLs more useful in?
ACLs work better with data-oriented systems where permissions are stored with the data or owners can set up permissions.
What are C-lists?
Capability lists are arrays of capabilities grouped by subject. Subject has a pointer to a linked list, with each node referring to an object and describing the subject’s permissions wrt that object
What are some issues with C-lists?
C-lists are more user-oriented and runtime checking is more efficient than with ACL. However, it is more time-consuming to determine who has access to a resource. Capabilities may be time-limited or even passed on to another user, e.g. allow access to X between 9am and 5pm, agents in smart spaces.
How does MAC work?
Security attributes (labels) that determine whether a subject can access a resource are assigned by an administrator. Subjects cannot change the security class of an object.
What are the differences between DAC and MAC?
In DAC object creator decides mutuable access rights of others. In MAC, admin/OS always does. MAC is immutable to untrusted processes and is therefore
used in highly sensitive or life critical systems. Both DAC and MAC have issues with cancelling, adding, merging etc of subjects or objects.
What are negative permissions?
Disallowing a subject from performing some access function on a certain object
What are policy conflicts?
When two or more access rules contradict one another and are mutually exclusive but both are present