Access Control Models

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

What are security models?

general classes of them which abstract away from concrete characteristics of specific domains

2
New cards

Authentication

The process of verifying the validity of something claimed by a system entity

3
New cards

Authorization

a right or a permission that is granted to a system entity to access a system resource.

4
New cards

Access Control

Protection of system resources against unauthorized access.

A process that regulates the use of system resources according to security policy allowing only authorized entities according to that policy.

5
New cards

What could be an authorized entity?

users, programs, processes, or other systems

6
New cards

What do typical access control models focus on?

authorization, i.e., specifying who may do what, and controlling how authorization can change

7
New cards

How is access control achieved?

by using policies

8
New cards

Where can we implement Access Control?

Locally: used to differentiate inside users from outside users; help users to operate on their own personal data.

Network: used to give wide access to data and service. (It holds all internet-based services.)

9
New cards

What does a security policy define?

What is allowed.

• It defines those executions of a system that are acceptable, or complementarily, those that are not acceptable

10
New cards

What is a security policy analogous to?

A set of laws

11
New cards

What terms are security policies defined in?

in terms of high-level rules or requirements.

12
New cards

Are policies immeasurable or measurable?

measurable

13
New cards

Where can security policies be enforced?

locally or in a network

14
New cards

What are access control models used for?

• To define a specific set of authorization rights.

• To define a set of policies for a software system to enforce a set of rights to fulfil the security concerns.

• To define a set of run-time system users that are used to assign the defined rights to the other users in the system.

• To protect for all multi-user systems, against violation of:

• Confidentiality (e.g., unauthorized disclosure)

• Integrity (e.g., improper modifications)

• Availability (e.g., service disruption)

15
New cards

What are the main models of access control?

• Discretionary Access Control (DAC) - Defined by the user

• Mandatory Access Control (MAC) - Defined by the system

• Role-based access control (RBAC) and its various extensions. - Defined by the roles

16
New cards

What is the principle behind the Discretionary Access Control (DAC) model?

users own resources and control their access. The owner may change object’s permissions at his discretion and can transfer ownership to other users.

17
New cards

Is DAC flexible?

Yes

18
New cards

What are the security limitations for Discretionary Access Control (DAC)?

open to mistakes, negligence, or abuse as it requires all users to understand mechanisms and understand and respect the security policy. It also does not allow for the control of information dissemination

19
New cards

What type of controls does DAC use?

identity-based controls

20
New cards

What does every object in DAC have?

an owner and a Discretionary access control list (DACL) that contains the permissions of the subjects

21
New cards

Who has full control over the DACL?

the owner

22
New cards

What are the general issues with DAC?

• Managing the policies for a large system is a complex task

• Difficult to understand that the correct accesses are provided to the right users

• The objects and subjects change frequently, thus, also their permissions need to change.

• Access matrix represents the explicit access relation between each individual subject and object, it grows very large very quickly

<p>• Managing the policies for a large system is a complex task </p><p>• Difficult to understand that the correct accesses are provided to the right users </p><p>• The objects and subjects change frequently, thus, also their permissions need to change. </p><p>• Access matrix represents the explicit access relation between each individual subject and object, it grows very large very quickly</p>
23
New cards

What does MAC stand for?

Mandatory Access Control

24
New cards

What is the main idea behind MAC?

Classification of subjects and objects by security levels.

25
New cards

How are access control decision made with MAC?

by comparing security labels indicating sensitivity/criticality of objects, with formal authorization, i.e. security clearances, of subjects.

26
New cards

How are MAC policies often determined?

with multi-level security policies.

27
New cards

How do MAC and DAC compare?

MAC is more rigid but more secure than DAC

28
New cards

Why is MAC mandatory?

As subjects may not transfer their access rights. The system owner has control not the users.

29
New cards

What does every subject have in MAC?

a profile, which includes the subjects clearance and their need-to know

30
New cards

What does every object have in MAC?

a security label composed of two parts: classification (e.g., sensitivity of the data) and a category (enforcement of need-to-know).

31
New cards

What happens when an entity attempts to access a specific resource?

the OS or security kernel will check the entity's credentials to determine whether access will be granted

32
New cards

What does RBAC stand for?

Role -Based Access Control

33
New cards

What is the main idea behind Rule Based Access Control?

Access is based on user’s role in the organization

34
New cards

Who associates each role to its various permissions?

The administrator

35
New cards

What happens when a user is assigned a rule?

They inherit the permissions associated to the role.

36
New cards

What are the benefits of RBAC?

• Reduces user administration

• Widely used by companies

• Easy to Audit

• Higher Flexibility

• Roles are abstraction of jobs or functions in an organization.

• Increases abstraction in policies. Policies become more manageable

37
New cards

What is the intuition behind RBAC uses?

Abstraction: Many subjects (or objects) have identical attributes, and policy is based on these attributes.

Hierarchy: Often functional/organizational hierarchies that determine access rights.

38
New cards

What is the approach of RBAC?

decompose subject/object relationship by introducing set of roles. Then assign subjects to roles and permissions to objects based on role. This idea can be generalized by introducing a hierarchy on roles (or even users or permissions).

39
New cards

What does RBAC use the notion of “role” as ?

it uses it as the central authorisation mechanism

40
New cards

What is a role in RBAC?

an abstract representation of a group of subjects that are allowed to perform the same operations on the same objects

41
New cards

What are objects in a RBAC system assigned to ?

The objects (i.e., accessible shared data) in the system are assigned to an authorised role

42
New cards

Why do the subjects (users) need to identify themselves?

So they can acquire roles to access and operate on the objects

43
New cards

What are the benefits of role hierarchies?

They simplify policy expression

44
New cards

What are the different types of RBAC?

• Flat RBAC is the simplest but can cause conflicts.

• Hierarchical RBAC simplifies the creation of new roles.

• Constrained RBAC

45
New cards

What are some other types of access control?

• Rule based access control (e.g., Firewalls)

• Temporal Based Access Control (the permissions are valid for a limited amount of time)

• Attributes-Based Access Control (access rights are granted based on policies that combine different attributes)

• A mixture of what we have seen so far.