1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Access Control System
Set of technical controls that govern how subjects may interact with objects
Subject — Users or software processes/anything that can request and be granted access to a resource
Objects — The resources (e.g. networks, servers, databases, files etc)
Access Control List (ACL)
List of subjects and the rights or permissions they have been granted on the object
Typically the basis of an Access Control System
Identification
Authentication
Authorisation
Accounting
The 4 main processes that describe an Access Control System
Identification — (Access Control System)
Creating an account or ID that identifies the user or process on the computer system.
Authentication — (Access Control System)
Proving that a subject is who or what it claims to be when it attempts to access the resource
Authorisation — (Access Control System)
Determining what rights or permissions subjects should have on each resource and enforcing those rights
Accounting — (Access Control System)
Tracking authorised and unauthorised usage of a resource or use of rights by a subject
Audit logs support this process/feature
Logging events support this process/feature
Least Privilege
The premise that a user should be granted rights necessary to perform their job and no more
Implicit Deny
Ruleset/Principle that unless there is a rule specifying that access should be granted (explicit authorization), any request for access will not be granted
True
Firewall filters access requests using a set of rules
These rules are processed from top to bottom
If a request does not fit any of the rules, it is handled by the last (default) rule, which is to refuse the request
True or False: Firewall policies employ the principle of implicit deny
Receive rights
An important consideration in designing a security system is to determine how users ______ to access resources
Can also be interpreted as how Access Control Lists are written
Discretionary Access Model (DAC) — Owner
Role-based Access Control (RBAC) — Users allocated roles
Mandatory Access Control (MAC) — Security Clearance
Rule-based Access Control — System-enforced rules
Access Control/Authorisation model classes
Discretionary Access Control — (Access Control Model)
This Access Control Model stresses the importance of the owner
The owner is originally the creator of the resource, though ownership can be assigned to another user
Owner is granted full control over the resource. He or she can modify its ACL to grant rights to others
Role-based Access Control (RBAC) — (Access Control Model)
This Access Control Model adds an extra degree of administrative control to another model
A set of organisational roles are defined and users allocated to those roles
A simple version of this model in visible in Windows user account types e.g. Admins and Standard Users
Mandatory Access Control (MAC) — (Access Control Model)
This Access Control Model is based on the idea of security clearance levels
Each object and each subject is granted a clearance level, referred to as a label
If the model used is hierarchical, subjects are only permitted to access objects at their clearance or below
OR each resource and user can be labelled as belonging to a domain (compartmentalised) — user may only access a resource if they belong to the same domain
Rule-based Access Control — (Access Control Model)
This Access Control Model is based around access control policies being determined by system-enforced rules rather than system users
Some other access control models are examples of this control model
Continuous authentication is an example of this model
E.g. UAC is activated once a change to the OS is being made, regardless of if the admin is signed in already
True
This is an example of rule-based access control
The admin, despite being signed in already, has to answer a prompt due to a rule being in place
True or False: UAC prevents/protects against account hijacking by a malicious script or similar
Non-Repudiation
The principle that the user cannot deny having performed some action
Logging Events
Actions by a user that are recorded by the access control system
E.g. a user signing in or attempting to modify a file or install an app
E.g. history of URLs visited kept by a web browser
Video
Biometrics
Strong authentication can prove that a person was genuinely operating their user account, not an intruder
Signature
Physical or digital signature can prove that the user was an author of a document
Receipt
Issuing a token with respect to some product or service is proof that a user requested that product and it was delivered
The 4 examples of mechanisms that provide non-repudiation