Week 1 Flashcards

1
Q

What are the most widely used mechanisms for authentication?

A

Something you know:

Password or pin

Something that you have:

Smart card or one-time password generator

Something that you are:

Facial scan/ photograph

Context location:

Your current location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are good systems for a password?

A

Good passwords are: long and random

Good systems:

  • Allow for passwords of arbitrary length
  • Store passwords hashed and salted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Biometric?

A

Uses of characteristics of your body:

  • Fingerprint
  • Retina scan

To authenticate the identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Hardware Tokens?

A

Chip cards

One-time password generators

Your unicard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Access Control Model?

A

Focus on authorization:

*Specification of who is allowed to do what (permissions)

*How to update/ change permissions

A simple access control model AC is a relation:

AC = Subject x Object x Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why can Access Control Models be complex?

A

Might depend on the system state

Subjects and permissions change over time

Access righs might require the fulfillment of obligations

Implementation bugs

Access control needs to be enforced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example for a simple permission check with Access Control Models?

A

(Achim, ExamECM2426,set) ∈ AC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the various forms of Access Control?

A

Physical protection:

eg. gates, turnstiles

Network Traffic:

eg. Firewalls

Hardware

eg. Memory management

Operating System

eg. File system

Application Level

eg. Google login, databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Security Policy?

A

Defines what is allowed (and/ or forbidden)

Similiar to a set of laws

Defined in terms of rules and/ or requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Security Model?

A

A formal representation of a class of systems

Highlights security features on a chosen level of abstraction

Provides a vocabulary to develop specific policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Access Control Matrix Model?

A

The access control matrix model is a way to manage who can do what in a system. Imagine it like a grid or a table

Based on ideas of privileges of subjects on objects

Subjects: Users, processes, agents, groups

Objects: Data, memory banks, other processes, files…

Privileges: Right to read, write, modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a protection state in an Access Control Matrix Model?

A

A Protection state relative to a set of privileges P, is a triple (S,O,M) with:

A set of current subjects S

A set of current objects O

A access control matrix M

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an example of a Protection State?

A

File 1 File2 File3

Alice read,write

Bob read read

Charlie append write execute

Alice, Bob, Charlie are subjects

File1, File2, File3 are objects

Matrix entries are set of privileges (rights)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 3 Fundamental Comcepts of Security?

A

Confidentiality - Protecting information from disclosure to unauthorized parties

Integrity - Protecting information from being modified by unauthorized parties

Availability - Ensuring information is available (accessible) to authorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Identification?

A

Associating an identity with a subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Authentication?

A

Verifying validity of something (usuall the identity claimed by a system entity)

17
Q

What is Authorization?

A

Granting (or denying) the right of permission of a system entity to access an object

18
Q

What is Access Control?

A

Controlling access of system entities (on behalf of the subjects) to objects based on an access control policy (“security policy”)

19
Q
A