Network and Computer Security Flashcards
Confidentiality
Integrity
Availability
Define Identification
Associating an indentity with a subject
Define Authentication
Verifying the validity of something
Define Authorization
Granting (or denying) the right or permission of a system entity to access an object
Define Access Control
Controlling the access of system entities (on behalf of subjects) to objects based on an access control policy
What are four widely used mechanisms for authentication?
- Something you know - Password/PIN
- Something you have - Smart card or one-time password
- Something you are - Biometric Characteristics/Facial Scan/Photograph
- Location
What do good systems include?
Allow for passwords and validate passwords securely
How to access systems securely that require a password
Allow passwords of arbitrary length
Store passwords hashed
Define Social Engineering
Tricking people into giving up private information or doing things they shouldn’t, usually by pretending to be someone they trust.
Define a Soft Token
A one-time use password
What is a bad example of a Hard Token?
UniCard as it could easily be duplicated
What is a Biometric Scan?
Uses characteristics of your body
- Fingerprint
- Retina scan
- Face scan
To authenticate your identity
What do Typical Access Control models focus on?
Authorization
- Specification of who is allowed to do what
- How to update/change permissions
Give an example of a simple access control model.
AC = Subject x Object x Request
List 4 key factors of access control models.
- Often depend on system state
- Subjects and permissionsd change over time
- Access rights might require the fulfillment of obligations
- They are prone to implementation and configuration mistakes (bugs)
What does a security policy do?
Defines what is allowed (and/or forbidden)
- It is analogous to a set of laws
- Defined in terms of rules and/or requirements
What is a security model?
A representation of a class of systems (and their behaviour)
What is a Role-based Access Control used for?
- Create roles for job functions in enterprises
- Assign users to roles
- Assign a et of permissions for each role
How is a RBAC formalized?
- A set ROLES
- A set USERS
- A relation UA ⊂ USER x ROLES
- A relation PA ⊂ ROLES x PERMISSION
What are key factors of a RBAC when it comes to changing/removing roles?
It uncommon to add/remove roles in organizations - they are more static
If people leave/change roles only one smaller, simpler table/relationship to update
- Employees leaving the company are much more in focus - don’t want them having permissions
What should be considered in a simple RBAC
- Role Hierarchies
- Who can change permission
- Context information
- User switching roles
What do most pratical RBAC applications use?
Extended/modified versions
- Role hierarchies
- Access control constraints (attributes)
What is widely used with RBAC?
XACML (attribute-based access control, very flexible)
What is a Hierarchical RBAC?
Extends RBAC with role hierarchy:
- A relation RH ⊂ ROLES x ROLES
- Describing the role hierarchy
What is Mandatory Access Control (MAC)?
AC descisions formalized by comparing security labels indicating sensitivity/critically of objects, with formal authorization - security clearances of subjects
How does MAC work?
Specifies system-wide access restriction to objects
- Mandatory because subjects may not ransfer their access rights
- Shift power from users to system owner
What are the 4 security clearance levels?
Top secret
- Comprehensive backgrounc check, highly-trusted individual
Secret
- Routine background check, trust individual
Confidential/Sensitive
- No background check. Limited distribution, minimally trusted individuals
Unclassified
- Unlimited distribution and untrusted individuals
Define a compartment
A compartment (or category) specifies a domain for a need-to-know policy
They are critical in complex coalitions
Define a partially ordered set
A set that is: Reflexive, Transitive, Anti-symmetric
What is a Reflexive set?
A reflexive set is a set in which every element is related to itself under a given relation.
What is a Transitive set?
A transitive set is a set where everything inside the set also has all of its “parts” included in the set.
(If a→b and b→c then a→c)
What is an Anti-symmetric set?
An antisymmetric relation means that if two things are related in both directions, they must actually be the same thing.
What is a Lattice?
A mathematical structure used to model relationships between security levels, access controls, or permissions.
Why use Lattices?
Recall all pairs of lattice elements have a least upper bound and a greatest lower bound
If labels form a lattice, we can uniquely answer questions like:
Given 2 objects with different labels, what is the minimal label a subject requires to be allowed to read both objects?
Given 2 subjects with different labels, what is the maximal label an object can have that can still be read by both subjects?
Well-suited for need-to-know policies, where each subject is assigned a label reflecting least privilege required for this function.
What is the Bell-LaPadula Model (BLP) ?
A security model used to protect classified information and control access to it. Considers cross-level communication where subjects may interact below their level of clearance
Main insight: prohibiting write-down is essential for confidentiality as otherwise information can effectively be reclassified.
Conclude the BLP model.
No information leakage possible (if implementation is secure)
Prevents “legitimate” communication from high-level subjects to low-level ones.
What is the Discretionary Access Control (DAC)?
Owners can change permissions