Secure Operating Environments - Access Control Datei Flashcards

1
Q

What is Access control ?

A

authentication + authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the differnce between authentication / authorisation ?

A

Authentication: Verifying identity of subject
Authorisation: Verifying that subject has right to perform
requested action on object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When do we need access control ?

A

Subjects request actions on objects

  • Alice wants to read a file
  • Bob wants to update account balance

Process wants to open a socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Discretionary access control (DAC) ?

A
  • Data owners, usually users, set access rights
  • There may be a policy against sharing and access may
    be audited, but the policy is not enforced technically
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where do we use DAC ?

A

Typicaly in commercial and consumer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name an Example of DAC outside computers.

A

Person with a key can open the door to others; door keys can be shared and copied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Access control list (ACL) ?

A

ACL = list of the access rights associated with an
object.

Example:
file1.txt ACL:
Alice: { read, write }; Bob: { read };
Process 4567: { read, write }; Process 6789: {append}.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where is ACL used ?

A

Windows/Unix file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Capability ?

A

Capability = access right associated with the
subject

Example:
Alice’s capabilities:
file1.txt: { read, write }; file2.txt: { write }.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Mandatory access control (MAC) ?

A
  • Access rights based on rules (i.e. policy) set by
    administration
  • AC policy enforced and cannot be changed by users
  • Subjects cannot leak access rights to others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where did MAC originate ?

A

MAC originates from military policies
– Officer can read secret paper but cannot take copy out of room
– Officer who has had contact with foreign agents may lose access to classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On what are the rules MAC uses often based ?

A
Mandatory access control rules are often based on
security labels on subjects and objects
– Subject clearance
– Object classification
l : (Subjects ∪ Objects) → Labels

Example:
Labels: Top Secret -> Secret -> Confidential -> Unclassified

Subject with clearance Top Secret has access to all labels ->
Simple security property:
S can read O if and only if l(S) ≥ l(O)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Group ?

A

Group = set of subjects
– E.g. Administrators, CS students
– Object ACL can list groups in addition to users
– Both group membership and ACLs change over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Role ?

A

Role = set of permissions
(i.e. permitted actions on objects)
– E.g. Administrator, INITSEC-teacher, IN-professor
– Roles usually quite static; assignment to users changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Role-based access control (RBAC)

?

A

Modeling high-level roles in an organisation
– E.g. Doctor, Nurse, Student, Lecturer, Course-assistant
– Roles defined once; changed infrequently

Roles may be parameterised
– E.g. Treating-doctor of Mr. Smith,
Lecturer of INITSEC, Student of INITSEC

Roles may form a hierarchy with inheritance
– E.g. Lecturer and Teaching-assistant are Teaching-staff

Roles are assigned to users for longer term but activated on demand for each session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Attribute-based access control (ABAC) ?

A

Expand RBAC with additional attributes

Base access decisions not just on subject identity, but also on subject/object/environment attributes, e.g. affiliation, type, time, place, content …