Discretionary Access Control (DAC) Quiz

LucrativeMagenta avatar
LucrativeMagenta
·
·
Download

Start Quiz

Study Flashcards

20 Questions

Which access control model is primarily concerned with protecting the integrity of data?

Biba Model

Which access control model is designed to prevent conflicts of interest?

Brewer and Nash Model

Which access control method is not implemented as often as it should be?

Capabilities

What does the term 'accountable' mean in the context of access control?

Keeping track of access to sensitive data

What does the term 'nonrepudiation' refer to?

Inability to deny a statement or action

Which access control model allows a user to access a resource if the resource owner has given them access, despite the MAC permissions?

Bell-LaPadula Model

Which access control model has security rules that are the exact opposite of those in the Bell-LaPadula Model?

Biba Model

In which industries is the Brewer and Nash Model commonly used?

Financial, medical, or legal industries

What is the key step in the process of allowing parties to access resources?

Authorization

What is the purpose of deterrence in access control?

Discouraging improper security behavior

Which access control model allows the owner of the resources to determine who gets access and what level of access they have?

Discretionary Access Control (DAC)

What is the principle that dictates giving a party only the bare minimum level of access it needs to perform its functionality?

Principle of Least Privilege

Which access control model allows access according to a set of rules defined by the system administrator?

Rule Based Access Control (RBAC)

What is a common way the principle of least privilege gets improperly implemented in operating systems?

Giving casual users administrative access

In which access control model is access granted or denied based on whether a rule is matched?

Rule Based Access Control (RBAC)

What is a good example of rule-based access control?

ACL used by a router

Which access control model allows the system administrator to define a set of rules for access?

Rule Based Access Control (RBAC)

What is the principle that states you should give a party only the bare minimum level of access it needs to perform its functionality?

Principle of Least Privilege

What is a common violation of the principle of least privilege?

Granting excessive access to users

In which access control model does the owner of the resources determine who gets access and what level of access they have?

Discretionary Access Control (DAC)

Study Notes

Access Control Models

  • The Integrity model is primarily concerned with protecting the integrity of data.
  • The Separation of Duties model is designed to prevent conflicts of interest.

Discretionary Access Control (DAC)

  • DAC allows a user to access a resource if the resource owner has given them access, despite the Mandatory Access Control (MAC) permissions.
  • In DAC, the owner of the resources determines who gets access and what level of access they have.

Mandatory Access Control (MAC)

  • MAC has security rules that are the exact opposite of those in the Bell-LaPadula Model.

Brewer and Nash Model

  • The Brewer and Nash Model is commonly used in the banking, financial, and healthcare industries.

Access Control Principles

  • The principle of least privilege dictates giving a party only the bare minimum level of access it needs to perform its functionality.
  • A common violation of the principle of least privilege is over-assigning privileges to users.

Rule-Based Access Control (RBAC)

  • RBAC allows access according to a set of rules defined by the system administrator.
  • A good example of RBAC is a firewall that blocks or allows traffic based on predefined rules.

Other Access Control Concepts

  • Accountability refers to the ability to track and trace the actions of a user or entity.
  • Nonrepudiation refers to the inability to deny involvement in a transaction or action.
  • The key step in the process of allowing parties to access resources is authentication.
  • The purpose of deterrence in access control is to discourage users from attempting to access unauthorized resources.

Implementation Issues

  • The principle of least privilege often gets improperly implemented in operating systems by giving users unnecessary privileges.

Test your knowledge of Discretionary Access Control (DAC) in operating systems. Learn about the owner's control over resource access and different levels of access. Explore DAC implementation in popular operating systems like Microsoft.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser