Quiz (Access Control) Flashcards

1
Q

What is a policy?

A

The rules of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does policy achieve secrecy?

A
  • Don’t allow reading by unauthorized subjects
  • Control where data can be written by authorized subjects
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does policy achieve integrity?

A

Don’t permit dependence on lower integrity data/code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does policy achieve availability?

A

The necessary function must run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a protection domain?

A

Specifies the set of resources (objects) that a process can access and the operations that the process may use to access such resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are protection domain done today?

A
  • memory protection
  • UNIX protection memory, file-system permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an access control system?

A

Determines what rights a particular entity has for a set of objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are subjects, objects and rights in simplified access control?

A
  • Subjects are the active entities that do things
  • Objects are passive things that things are done to
  • Rights are actions that are taken
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a protection state?

A

Defines what each subject can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A reference monitor enforces the protection state. What are some guarantees that a correct reference make?

A
  • Tamperproof
  • Complete mediation
  • Simple enough to verify
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a protection system consists of?

A
  • A protection state
  • operations to modify that state
  • a reference monitor to enforce that state
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the principle of least privilege?

A

A system should only provide those rights needed to perform the processes function and no more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Discretionary Access Control?

A
  • object “owners” define policy
  • users have discretion over who has access to what objects and when)
  • canonical example: the UNIX file system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Mandatory Access Control?

A
  • Environment enforces static policy
  • access control policy defines by environment, user has no control over access control
  • canonical example: process labeling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In DAC, subjects can _______, and subjects’ programs can _______. But in MAC, they cannot.

A

pass right onto other subjects; pass their rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

For most DAC models, safety is _____.

A

undecideable; thats why we need to either 1) restrict the model, 2) test incrementally

17
Q

There is a ____ relation between users and roles, roles and permissions in RBAC.

A

many-to-many

18
Q

RBAS is a class of access control not direct MAC and DAC. T/F

A

True

19
Q

Groups are ____; a role is ____.

A

collections of identities who are assigned rights as a collective; a collection of privileges/permissions associated with some function of affiliation

20
Q

What is a multi-level security?

A

Tags all objects and subjects with security tags classifying them in terms of sensitivity/access level.

21
Q

In US DOD, read access is allowed if ____.

A

subject clearance level >= object sensitivity level and subject categories /in object categories. (read down)

22
Q

BLP model enforces: ___ and ___.

A

Simple security policy (no read up); star property (no write down).

23
Q

Biba defines ____.

A

a dual of secrecy for integrity