Untitled Quiz
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which class of access control grants the least amount of access to users who are not included in the owner or group categories?

  • System Administrator
  • World (correct)
  • Group
  • Owner

What is a primary function of access control in computer security?

  • To implement measures that assure access control services (correct)
  • To ensure wireless connections are always secure
  • To provide physical security for the hardware
  • To authorize remote execution of all commands

Which of the following is a responsibility of the owner class in access control?

  • To manage access rights to system resources (correct)
  • To authorize wireless access before connections
  • To control connection of mobile devices
  • To encrypt controlled unclassified information

What is an essential practice for protecting wireless access according to access control principles?

<p>Authenticate and encrypt wireless connections (C)</p> Signup and view all the answers

Which action should be avoided when dealing with external information systems?

<p>Connecting without verifying security protocols (D)</p> Signup and view all the answers

What is the primary goal of access control as defined by NIST-IR 7298?

<p>To regulate specific requests to resources (A)</p> Signup and view all the answers

Which requirement ensures that users can only execute functions they are authorized for?

<p>Limit information system access (A)</p> Signup and view all the answers

What does the principle of least privilege entail?

<p>Granting only necessary access to perform specific tasks (D)</p> Signup and view all the answers

Why is it important to limit unsuccessful logon attempts?

<p>To prevent unauthorized access attempts (B)</p> Signup and view all the answers

What does controlling the flow of Controlled Unclassified Information (CUI) require?

<p>Strict adherence to approved authorizations (D)</p> Signup and view all the answers

What should be included in security notices provided to users?

<p>Privacy and security notices consistent with applicable CUI rules (A)</p> Signup and view all the answers

What role do cryptographic mechanisms play in remote access sessions?

<p>Protect the confidentiality of the sessions (A)</p> Signup and view all the answers

What is a key function of session locking in security requirements?

<p>To prevent data access after inactivity (B)</p> Signup and view all the answers

What is the primary role of the access matrix controller?

<p>To mediate updates to the access matrix (A)</p> Signup and view all the answers

Which rule allows a subject to transfer an access right without the copy flag due to security concerns?

<p>Rule R1 (D)</p> Signup and view all the answers

According to Rule R3, what action can a subject S0 perform regarding access rights?

<p>Delete any access right from any subject it owns (B)</p> Signup and view all the answers

What permission does Rule R5 grant to any subject?

<p>Create a new object and control access to it (A)</p> Signup and view all the answers

What occurs when the owner of an object executes Rule R6?

<p>The corresponding column of the access matrix is deleted (D)</p> Signup and view all the answers

Which rule allows a subject to read parts of the access matrix it owns or controls?

<p>Rule R4 (D)</p> Signup and view all the answers

What capability does Rule R7 provide a subject?

<p>The ability to create a new subject and own it (B)</p> Signup and view all the answers

What is the effect of Rule R8 regarding the access matrix?

<p>It allows deletion of the subject's row and columns from the matrix (B)</p> Signup and view all the answers

Which of the following describes a 'Subject' in an access control context?

<p>An entity capable of accessing objects (B)</p> Signup and view all the answers

What does Role-Based Access Control (RBAC) primarily depend on?

<p>The roles users have within the system (A)</p> Signup and view all the answers

In Discretionary Access Control (DAC), what permits an entity to enable another entity to access resources?

<p>Granting of access rights (B)</p> Signup and view all the answers

Which of the following access rights is NOT typically included in access control?

<p>Encrypt (B)</p> Signup and view all the answers

What is an access matrix primarily used for in the context of DAC?

<p>To depict the access rights of subjects to objects (A)</p> Signup and view all the answers

Mandatory Access Control (MAC) works by comparing what type of information?

<p>Security labels with security clearances (B)</p> Signup and view all the answers

Which dimension is typically NOT part of the DAC access matrix?

<p>Environmental conditions (A)</p> Signup and view all the answers

Which type of access control relates to attributes of the user and the resources accessed?

<p>Attribute-based access control (A)</p> Signup and view all the answers

What aspect does 'World' refer to in the context of subjects in access control?

<p>Public entities and non-restricted access (C)</p> Signup and view all the answers

Which entry type indicates the specific access rights of a particular subject for a particular object?

<p>Access matrix (B)</p> Signup and view all the answers

What defines the protection state of a system?

<p>The access rights information for subjects and objects. (A)</p> Signup and view all the answers

Which of the following is NOT a requirement of a protection state?

<p>Allowing subjects to delete objects. (C)</p> Signup and view all the answers

In an access control matrix, what does an entry A[S, X] represent?

<p>The privileges that subject S has over object X. (C)</p> Signup and view all the answers

What is the first step when a subject issues a request to access an object?

<p>The subject issues a request of type α for object X. (B)</p> Signup and view all the answers

What happens if an access attempt does not match the access rights specified in the matrix?

<p>The access is denied, and a protection violation occurs. (D)</p> Signup and view all the answers

Which of the following access rights does NOT relate to devices?

<p>Grant access rights to processes. (D)</p> Signup and view all the answers

Which component is responsible for evaluating access requests?

<p>The access control module. (A)</p> Signup and view all the answers

In relation to subjects, what does the ability to alter access rights involve?

<p>Granting or deleting access rights for other subjects. (C)</p> Signup and view all the answers

Flashcards

Access Control

The process of allowing or denying requests to use information, services, or physical locations.

Authorized Entities

Users, programs, processes, or systems allowed access according to security policy.

Security Policy

Rules governing access and use of system resources.

Least Privilege

Granting users and processes only the necessary access to perform their tasks.

Signup and view all the flashcards

Limit Access to Authorized Users

Restricting system access to only those who have permission.

Signup and view all the flashcards

Controlling Transaction Types

Restricting access to specific actions or tasks in an information system.

Signup and view all the flashcards

Remote Access Control Points

Managed points for controlling remote access to systems.

Signup and view all the flashcards

Session Lock

Automatically locking a user session after a period of inactivity to prevent unauthorized access.

Signup and view all the flashcards

Access Control

The process of limiting who or what can access a resource or system.

Signup and view all the flashcards

Access Rights

Specific permissions granted to a subject to interact with an object.

Signup and view all the flashcards

Classes of Access Control

Categorizations of users with varying access levels (Owner, Group, World).

Signup and view all the flashcards

Controlled Unclassified Information (CUI)

Unclassified information requiring special handling and access controls due to sensitivity.

Signup and view all the flashcards

Computer Security

Measures that ensure access control and other security services in a computer system.

Signup and view all the flashcards

Protection State

Information specifying access rights for subjects to objects at a specific time.

Signup and view all the flashcards

Access Control Matrix (A[S, X])

A table specifying access rights of subject S to object X, using 'access attributes' (e.g., read, write).

Signup and view all the flashcards

Access Control Module

A module assigned to each object type that evaluates access requests and enforces access rights.

Signup and view all the flashcards

Protection Violation

Error occurring when a subject attempts access denied by the access control module.

Signup and view all the flashcards

Access Attributes

Strings that describe the specific access rights (e.g., read, write, delete).

Signup and view all the flashcards

Access Request

A subject's request to use an object or perform an action related to said object.

Signup and view all the flashcards

Object Controller

The module managing access to a particular object.

Signup and view all the flashcards

Subject

An entity (user, process, program) that requests access to objects.

Signup and view all the flashcards

Access Right

Describes how a subject can access an object.

Signup and view all the flashcards

Subject

An entity that can access objects.

Signup and view all the flashcards

Object

A resource with controlled access.

Signup and view all the flashcards

DAC (Discretionary Access Control)

Access control based on subject identity and access rules.

Signup and view all the flashcards

RBAC (Role-Based Access Control)

Access control based on user roles and system rules.

Signup and view all the flashcards

MAC (Mandatory Access Control)

Access control based on security labels and clearances.

Signup and view all the flashcards

ABAC (Attribute-Based Access Control)

Access control based on user, resource, and environmental attributes.

Signup and view all the flashcards

Access Matrix

Table showing access rights for each subject for each object.

Signup and view all the flashcards

Access Control List

Object-wise view of access rights for each subject.

Signup and view all the flashcards

Capability List

Subject-wise view of access rights to each object.

Signup and view all the flashcards

Access Matrix Modification Rule

Rules for changing access permissions in an access control matrix.

Signup and view all the flashcards

Owner Access Right

Permission to grant or revoke access rights to an object.

Signup and view all the flashcards

Copy Flag in Access Right

A flag that determines if an access right can be transferred without its restrictions.

Signup and view all the flashcards

Access Right Deletion

Removing access permissions from a subject to an object.

Signup and view all the flashcards

Object Deletion (by Owner)

The owner of an object can remove it and remove its access, deleting a column in the access matrix.

Signup and view all the flashcards

Subject Hierarchy Creation

One subject can create and own another, potentially forming a layered structure in access control.

Signup and view all the flashcards

Subject Deletion(by Owner)

The owner of a subject can remove it along with its access permissions, removing a row and corresponding columns.

Signup and view all the flashcards

Matrix Access by Subject

A subject can read the part of the access matrix relating to objects it owns or controls.

Signup and view all the flashcards

Study Notes

Computer Security (IS-820) - Access Control

  • Access control is defined as the process of granting or denying specific requests to obtain and use information and related processing services, and to enter specific physical facilities.
  • NIST-IR 7298 (May 2013) defines access control in this way.
  • RFC 4949 defines access control as a process by which system resource use is regulated according to a security policy, permitting use only by authorized entities (users, programs, processes, or other systems).
  • Computer security is fundamentally concerned with access control.
  • RFC 4949 defines computer security as measures that assure security services in a computer system, especially those assuring access control service.

Basic Security Requirements

  • Limit information system access to authorized users, processes acting on their behalf, or devices.
  • Limit system access to authorized transactions and functions.
  • Control the flow of sensitive information (CUI) according to approved authorizations.
  • Separate individual duties to limit malicious activity without collusion.
  • Employ the principle of least privilege, especially for security functions and privileged accounts.
  • Use non-privileged accounts when performing non-security functions.
  • Prevent non-privileged users from executing privileged functions and audit such executions.
  • Limit unsuccessful login attempts and provide privacy notices.
  • Employ session locks with pattern-hiding to prevent data viewing after inactivity.
  • Automatically terminate sessions after defined conditions.
  • Control and monitor remote access sessions.
  • Cryptographically secure remote access sessions.
  • Route remote access through managed points.
  • Authorize remote execution of privileged commands and security-relevant information access.
  • Authorize wireless access before allowing connections.
  • Protect wireless access with authentication and encryption.
  • Control mobile device connections.
  • Encrypt sensitive information on mobile devices.
  • Verify and limit external system connections.
  • Limit the use of organizational portable storage on external systems.
  • Control CUI on publicly accessible systems.

Access Control Definitions

  • SP 800-171 Access Control Security Requirements

Access Control Principles

  • Access control is a broad concept encompassing all computer security concerns.

Access Control and Security Functions

  • Authentication: Verifying user or entity credentials
  • Authorization: Granting access rights
  • Audit: Independent review for system control adequacy, compliance, breach detection, and change recommendations

Classes of Access Control

  • Owner: The creator or administrator of the resource, potentially a system administrator or project leader for system or project-specific resources.
  • Group: Groups of users with granted rights, allowing access based on group membership.
  • World: Users able to access the system, but lacking owner or group access rights.

Access Rights

  • Read: Viewing data (records, fields, files).
  • Write: Adding, modifying, or deleting data within resources. Includes read access.
  • Execute: Running programs.
  • Delete: Removing files/records.
  • Create: Producing new files/records/fields.
  • Search: Listing or locating resources within a directory.

Subjects, Objects, and Access Rights

  • Subject: An entity capable of accessing objects. Three classes: owner, group, world.
  • Object: A resource with controlled access.
  • Access right: Specifies how a subject accesses the object and may include 'Read', 'Write', 'Execute', 'Delete', 'Create', and 'Search'.

Access Control Policies

  • DAC (Discretionary Access Control): Access control based on the identity of a requestor and on access rules and authorizations. It specifies what the requestor is allowed to do.
  • MAC (Mandatory Access Control): Access control based on comparing security labels with security clearances.
  • RBAC (Role-Based Access Control): Access control based on roles, rules defining allowed actions for users within those roles.
  • ABAC (Attribute-Based Access Control): Access control based on user attributes, resource attributes, and current environmental conditions.

Discretionary Access Control (DAC)

  • An entity is granted access by another - enabling other entities access.
  • Uses an access matrix for subject access.
  • Implementation often uses Access Control Lists (ACLs) or Capability Lists.
  • Usually operates by associating an ACL with each object (file), and that ACL lists the subjects and their access rights.
  • A capability list for each subject will list what objects and associated rights the subject has.

Access Control Matrix, ACLs & Capability Lists

  • Access control matrices are often too broad to maintain directly. ACLs and capability lists are alternatives.
  • ACL (Access Control List): List of subjects, access rights associated with each object; often used in practice instead of a matrix.
  • Capability List: A list of objects and access rights for a subject. This is stored in the subject's records.

An Access Control Model

  • Assumes subjects, objects, and rules governing subject access.
  • A protection state describes the access rights at any given time.
  • Must be able to represent, enforce, and allow subjects to modify the state.
  • Objects that need control: Processes, devices, memory locations.

The Access Control Module

  • A separate module manages access to specific objects.
  • Each access request triggers steps which result in a message to the object's controller.
  • The controller consults the access matrix, granting or denying access based on the rules.

The Access Control Function

  • Access to each object is controlled by a controller based on the access matrix and rules.
  • Subjects permitted to modify the access matrix.
  • Matrix entries are objects, accesses mediated by access matrix controllers, and controllers control updates.

Rules to Modify the Access Control Matrix

  • Specific rules govern how the access matrix can be changed.
  • This involves commands (e.g., grant, delete) and corresponding authorizations (e.g., owner, control)
  • These rules describe operations on the matrix for subject access modification.

Hierarchy of Subjects

  • Subjects can be arranged in a hierarchy, possibly using the 'owner' attribute to construct a hierarchy.
  • This hierarchical arrangement can be used to establish relationships and grant/revoke access accordingly.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Untitled Quiz
6 questions

Untitled Quiz

AdoredHealing avatar
AdoredHealing
Untitled Quiz
37 questions

Untitled Quiz

WellReceivedSquirrel7948 avatar
WellReceivedSquirrel7948
Untitled Quiz
18 questions

Untitled Quiz

RighteousIguana avatar
RighteousIguana
Untitled Quiz
50 questions

Untitled Quiz

JoyousSulfur avatar
JoyousSulfur
Use Quizgecko on...
Browser
Browser