Untitled Quiz
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which class of access control grants the least amount of access to users who are not included in the owner or group categories?

  • System Administrator
  • World (correct)
  • Group
  • Owner
  • What is a primary function of access control in computer security?

  • To implement measures that assure access control services (correct)
  • To ensure wireless connections are always secure
  • To provide physical security for the hardware
  • To authorize remote execution of all commands
  • Which of the following is a responsibility of the owner class in access control?

  • To manage access rights to system resources (correct)
  • To authorize wireless access before connections
  • To control connection of mobile devices
  • To encrypt controlled unclassified information
  • What is an essential practice for protecting wireless access according to access control principles?

    <p>Authenticate and encrypt wireless connections</p> Signup and view all the answers

    Which action should be avoided when dealing with external information systems?

    <p>Connecting without verifying security protocols</p> Signup and view all the answers

    What is the primary goal of access control as defined by NIST-IR 7298?

    <p>To regulate specific requests to resources</p> Signup and view all the answers

    Which requirement ensures that users can only execute functions they are authorized for?

    <p>Limit information system access</p> Signup and view all the answers

    What does the principle of least privilege entail?

    <p>Granting only necessary access to perform specific tasks</p> Signup and view all the answers

    Why is it important to limit unsuccessful logon attempts?

    <p>To prevent unauthorized access attempts</p> Signup and view all the answers

    What does controlling the flow of Controlled Unclassified Information (CUI) require?

    <p>Strict adherence to approved authorizations</p> Signup and view all the answers

    What should be included in security notices provided to users?

    <p>Privacy and security notices consistent with applicable CUI rules</p> Signup and view all the answers

    What role do cryptographic mechanisms play in remote access sessions?

    <p>Protect the confidentiality of the sessions</p> Signup and view all the answers

    What is a key function of session locking in security requirements?

    <p>To prevent data access after inactivity</p> Signup and view all the answers

    What is the primary role of the access matrix controller?

    <p>To mediate updates to the access matrix</p> Signup and view all the answers

    Which rule allows a subject to transfer an access right without the copy flag due to security concerns?

    <p>Rule R1</p> Signup and view all the answers

    According to Rule R3, what action can a subject S0 perform regarding access rights?

    <p>Delete any access right from any subject it owns</p> Signup and view all the answers

    What permission does Rule R5 grant to any subject?

    <p>Create a new object and control access to it</p> Signup and view all the answers

    What occurs when the owner of an object executes Rule R6?

    <p>The corresponding column of the access matrix is deleted</p> Signup and view all the answers

    Which rule allows a subject to read parts of the access matrix it owns or controls?

    <p>Rule R4</p> Signup and view all the answers

    What capability does Rule R7 provide a subject?

    <p>The ability to create a new subject and own it</p> Signup and view all the answers

    What is the effect of Rule R8 regarding the access matrix?

    <p>It allows deletion of the subject's row and columns from the matrix</p> Signup and view all the answers

    Which of the following describes a 'Subject' in an access control context?

    <p>An entity capable of accessing objects</p> Signup and view all the answers

    What does Role-Based Access Control (RBAC) primarily depend on?

    <p>The roles users have within the system</p> Signup and view all the answers

    In Discretionary Access Control (DAC), what permits an entity to enable another entity to access resources?

    <p>Granting of access rights</p> Signup and view all the answers

    Which of the following access rights is NOT typically included in access control?

    <p>Encrypt</p> Signup and view all the answers

    What is an access matrix primarily used for in the context of DAC?

    <p>To depict the access rights of subjects to objects</p> Signup and view all the answers

    Mandatory Access Control (MAC) works by comparing what type of information?

    <p>Security labels with security clearances</p> Signup and view all the answers

    Which dimension is typically NOT part of the DAC access matrix?

    <p>Environmental conditions</p> Signup and view all the answers

    Which type of access control relates to attributes of the user and the resources accessed?

    <p>Attribute-based access control</p> Signup and view all the answers

    What aspect does 'World' refer to in the context of subjects in access control?

    <p>Public entities and non-restricted access</p> Signup and view all the answers

    Which entry type indicates the specific access rights of a particular subject for a particular object?

    <p>Access matrix</p> Signup and view all the answers

    What defines the protection state of a system?

    <p>The access rights information for subjects and objects.</p> Signup and view all the answers

    Which of the following is NOT a requirement of a protection state?

    <p>Allowing subjects to delete objects.</p> Signup and view all the answers

    In an access control matrix, what does an entry A[S, X] represent?

    <p>The privileges that subject S has over object X.</p> Signup and view all the answers

    What is the first step when a subject issues a request to access an object?

    <p>The subject issues a request of type α for object X.</p> Signup and view all the answers

    What happens if an access attempt does not match the access rights specified in the matrix?

    <p>The access is denied, and a protection violation occurs.</p> Signup and view all the answers

    Which of the following access rights does NOT relate to devices?

    <p>Grant access rights to processes.</p> Signup and view all the answers

    Which component is responsible for evaluating access requests?

    <p>The access control module.</p> Signup and view all the answers

    In relation to subjects, what does the ability to alter access rights involve?

    <p>Granting or deleting access rights for other subjects.</p> Signup and view all the answers

    Study Notes

    Computer Security (IS-820) - Access Control

    • Access control is defined as the process of granting or denying specific requests to obtain and use information and related processing services, and to enter specific physical facilities.
    • NIST-IR 7298 (May 2013) defines access control in this way.
    • RFC 4949 defines access control as a process by which system resource use is regulated according to a security policy, permitting use only by authorized entities (users, programs, processes, or other systems).
    • Computer security is fundamentally concerned with access control.
    • RFC 4949 defines computer security as measures that assure security services in a computer system, especially those assuring access control service.

    Basic Security Requirements

    • Limit information system access to authorized users, processes acting on their behalf, or devices.
    • Limit system access to authorized transactions and functions.
    • Control the flow of sensitive information (CUI) according to approved authorizations.
    • Separate individual duties to limit malicious activity without collusion.
    • Employ the principle of least privilege, especially for security functions and privileged accounts.
    • Use non-privileged accounts when performing non-security functions.
    • Prevent non-privileged users from executing privileged functions and audit such executions.
    • Limit unsuccessful login attempts and provide privacy notices.
    • Employ session locks with pattern-hiding to prevent data viewing after inactivity.
    • Automatically terminate sessions after defined conditions.
    • Control and monitor remote access sessions.
    • Cryptographically secure remote access sessions.
    • Route remote access through managed points.
    • Authorize remote execution of privileged commands and security-relevant information access.
    • Authorize wireless access before allowing connections.
    • Protect wireless access with authentication and encryption.
    • Control mobile device connections.
    • Encrypt sensitive information on mobile devices.
    • Verify and limit external system connections.
    • Limit the use of organizational portable storage on external systems.
    • Control CUI on publicly accessible systems.

    Access Control Definitions

    • SP 800-171 Access Control Security Requirements

    Access Control Principles

    • Access control is a broad concept encompassing all computer security concerns.

    Access Control and Security Functions

    • Authentication: Verifying user or entity credentials
    • Authorization: Granting access rights
    • Audit: Independent review for system control adequacy, compliance, breach detection, and change recommendations

    Classes of Access Control

    • Owner: The creator or administrator of the resource, potentially a system administrator or project leader for system or project-specific resources.
    • Group: Groups of users with granted rights, allowing access based on group membership.
    • World: Users able to access the system, but lacking owner or group access rights.

    Access Rights

    • Read: Viewing data (records, fields, files).
    • Write: Adding, modifying, or deleting data within resources. Includes read access.
    • Execute: Running programs.
    • Delete: Removing files/records.
    • Create: Producing new files/records/fields.
    • Search: Listing or locating resources within a directory.

    Subjects, Objects, and Access Rights

    • Subject: An entity capable of accessing objects. Three classes: owner, group, world.
    • Object: A resource with controlled access.
    • Access right: Specifies how a subject accesses the object and may include 'Read', 'Write', 'Execute', 'Delete', 'Create', and 'Search'.

    Access Control Policies

    • DAC (Discretionary Access Control): Access control based on the identity of a requestor and on access rules and authorizations. It specifies what the requestor is allowed to do.
    • MAC (Mandatory Access Control): Access control based on comparing security labels with security clearances.
    • RBAC (Role-Based Access Control): Access control based on roles, rules defining allowed actions for users within those roles.
    • ABAC (Attribute-Based Access Control): Access control based on user attributes, resource attributes, and current environmental conditions.

    Discretionary Access Control (DAC)

    • An entity is granted access by another - enabling other entities access.
    • Uses an access matrix for subject access.
    • Implementation often uses Access Control Lists (ACLs) or Capability Lists.
    • Usually operates by associating an ACL with each object (file), and that ACL lists the subjects and their access rights.
    • A capability list for each subject will list what objects and associated rights the subject has.

    Access Control Matrix, ACLs & Capability Lists

    • Access control matrices are often too broad to maintain directly. ACLs and capability lists are alternatives.
    • ACL (Access Control List): List of subjects, access rights associated with each object; often used in practice instead of a matrix.
    • Capability List: A list of objects and access rights for a subject. This is stored in the subject's records.

    An Access Control Model

    • Assumes subjects, objects, and rules governing subject access.
    • A protection state describes the access rights at any given time.
    • Must be able to represent, enforce, and allow subjects to modify the state.
    • Objects that need control: Processes, devices, memory locations.

    The Access Control Module

    • A separate module manages access to specific objects.
    • Each access request triggers steps which result in a message to the object's controller.
    • The controller consults the access matrix, granting or denying access based on the rules.

    The Access Control Function

    • Access to each object is controlled by a controller based on the access matrix and rules.
    • Subjects permitted to modify the access matrix.
    • Matrix entries are objects, accesses mediated by access matrix controllers, and controllers control updates.

    Rules to Modify the Access Control Matrix

    • Specific rules govern how the access matrix can be changed.
    • This involves commands (e.g., grant, delete) and corresponding authorizations (e.g., owner, control)
    • These rules describe operations on the matrix for subject access modification.

    Hierarchy of Subjects

    • Subjects can be arranged in a hierarchy, possibly using the 'owner' attribute to construct a hierarchy.
    • This hierarchical arrangement can be used to establish relationships and grant/revoke access accordingly.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Untitled Quiz
    6 questions

    Untitled Quiz

    AdoredHealing avatar
    AdoredHealing
    Untitled Quiz
    19 questions

    Untitled Quiz

    TalentedFantasy1640 avatar
    TalentedFantasy1640
    Untitled Quiz
    55 questions

    Untitled Quiz

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Untitled Quiz
    50 questions

    Untitled Quiz

    JoyousSulfur avatar
    JoyousSulfur
    Use Quizgecko on...
    Browser
    Browser