Podcast
Questions and Answers
What does RBAC stand for?
What does RBAC stand for?
- Role-Authorized Access Condition
- Role-Based Access Control (correct)
- Role-Based Approval Code
- Role-Assigned Behavior Control
In an RBAC system, a department manager has the right to modify any data within their department.
In an RBAC system, a department manager has the right to modify any data within their department.
False (B)
What is a major disadvantage of ABAC as mentioned in the content?
What is a major disadvantage of ABAC as mentioned in the content?
Changing user permissions
In RBAC, user permissions are based solely on the user's assigned __________.
In RBAC, user permissions are based solely on the user's assigned __________.
Match the role in an RBAC system with their corresponding access level:
Match the role in an RBAC system with their corresponding access level:
Which of the following is true about ABAC?
Which of the following is true about ABAC?
What does the Trusted Computing Base (TCB) primarily consist of?
What does the Trusted Computing Base (TCB) primarily consist of?
RBAC allows for user permission adjustments based solely on changes in user roles.
RBAC allows for user permission adjustments based solely on changes in user roles.
How does ABAC differ in flexibility compared to RBAC?
How does ABAC differ in flexibility compared to RBAC?
A larger TCB provides less flexibility for developers.
A larger TCB provides less flexibility for developers.
Name one advantage of a small TCB.
Name one advantage of a small TCB.
Three elements that are inside the TCB are: Kernel, _____, and the cryptography component.
Three elements that are inside the TCB are: Kernel, _____, and the cryptography component.
Which of the following should probably not be included in the TCB?
Which of the following should probably not be included in the TCB?
The biggest threat to the TCB is the software it runs.
The biggest threat to the TCB is the software it runs.
What is a supply-chain attack?
What is a supply-chain attack?
Match the elements with their description regarding the TCB:
Match the elements with their description regarding the TCB:
What should the Trusted Computing Base (TCB) be in relation to a system's security needs?
What should the Trusted Computing Base (TCB) be in relation to a system's security needs?
The principle of least privilege suggests that users should be granted maximum privileges to perform their tasks.
The principle of least privilege suggests that users should be granted maximum privileges to perform their tasks.
What can be affected if the authorization mechanism is compromised?
What can be affected if the authorization mechanism is compromised?
If a user can perform administrative tasks without proper authorization, it indicates a possible _____ in the system's security.
If a user can perform administrative tasks without proper authorization, it indicates a possible _____ in the system's security.
Match the following user roles with their respective privileges:
Match the following user roles with their respective privileges:
Why is confidentiality important in a system?
Why is confidentiality important in a system?
A user granted unauthorized access to change another user's password indicates a well-functioning authorization mechanism.
A user granted unauthorized access to change another user's password indicates a well-functioning authorization mechanism.
What does the term 'privilege escalation' refer to in system security?
What does the term 'privilege escalation' refer to in system security?
What are the two concepts that RBAC-A utilizes?
What are the two concepts that RBAC-A utilizes?
In RBAC-A, permissions are determined at the time of role definition.
In RBAC-A, permissions are determined at the time of role definition.
Name one of the MAC systems used by Linux.
Name one of the MAC systems used by Linux.
In ABAC, the rule format includes 'If the role is ______ and working day is ______...'
In ABAC, the rule format includes 'If the role is ______ and working day is ______...'
Match the following MAC systems with their characteristics:
Match the following MAC systems with their characteristics:
Which statement accurately describes SELinux?
Which statement accurately describes SELinux?
AppArmor restricts applications based on roles.
AppArmor restricts applications based on roles.
What type of permissions can be added or removed in RBAC-A?
What type of permissions can be added or removed in RBAC-A?
Flashcards
Trusted Computing Base (TCB)
Trusted Computing Base (TCB)
A collection of hardware, software, and controls working together to enforce a security policy within a computer system.
Large TCB
Large TCB
A larger TCB includes more security mechanisms, such as extensive logging, encryption, and secure communications, offering more comprehensive security coverage.
Small TCB
Small TCB
A smaller TCB, due to its limited components, is easier to secure, has fewer vulnerabilities, and is more portable, making it suitable for integrating into various systems.
Elements within the TCB
Elements within the TCB
Signup and view all the flashcards
Elements NOT suitable for the TCB
Elements NOT suitable for the TCB
Signup and view all the flashcards
Threat to the TCB: Hardware Vulnerability
Threat to the TCB: Hardware Vulnerability
Signup and view all the flashcards
Mitigating Hardware Vulnerability
Mitigating Hardware Vulnerability
Signup and view all the flashcards
Security Effectiveness
Security Effectiveness
Signup and view all the flashcards
User Privileges
User Privileges
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Authorization Mechanism
Authorization Mechanism
Signup and view all the flashcards
Privilege Escalation
Privilege Escalation
Signup and view all the flashcards
Principle of Least Privilege
Principle of Least Privilege
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Defense in Depth
Defense in Depth
Signup and view all the flashcards
TCB (Trusted Computing Base)
TCB (Trusted Computing Base)
Signup and view all the flashcards
Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC)
Signup and view all the flashcards
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control (ABAC)
Signup and view all the flashcards
RBAC's Strictness
RBAC's Strictness
Signup and view all the flashcards
ABAC's Flexibility
ABAC's Flexibility
Signup and view all the flashcards
ABAC's Efficiency
ABAC's Efficiency
Signup and view all the flashcards
ABAC's Challenges
ABAC's Challenges
Signup and view all the flashcards
RBAC: Simple but Rigid
RBAC: Simple but Rigid
Signup and view all the flashcards
ABAC: Flexible but Complex
ABAC: Flexible but Complex
Signup and view all the flashcards
Role-Based Access Control with Attributes (RBAC-A)
Role-Based Access Control with Attributes (RBAC-A)
Signup and view all the flashcards
Dynamic Attributes in RBAC-A
Dynamic Attributes in RBAC-A
Signup and view all the flashcards
Mandatory Access Control (MAC)
Mandatory Access Control (MAC)
Signup and view all the flashcards
Security-Enhanced Linux (SELinux)
Security-Enhanced Linux (SELinux)
Signup and view all the flashcards
AppArmor
AppArmor
Signup and view all the flashcards
SELinux vs. AppArmor
SELinux vs. AppArmor
Signup and view all the flashcards
Contextual Access Control
Contextual Access Control
Signup and view all the flashcards
MAC in Linux
MAC in Linux
Signup and view all the flashcards
Study Notes
Trusted Computing Base (TCB)
- TCB is the combination of hardware, software, and controls that work together to enforce computer security policies.
- A larger TCB offers broader security coverage through more comprehensive security mechanisms (e.g., logging, encryption). This allows for more flexible use due to numerous built-in functions.
- A smaller TCB is easier to protect because it has fewer components, which decreases vulnerabilities. Smaller TCBs are also portable.
- Three common elements within a TCB include the kernel, authentication mechanisms (biometrics/passwords), and cryptography components (key management and encryption).
- Three elements that should not typically be part of a TCB include third-party applications, activity surveillance mechanisms (like loggers), and unnecessary user applications. These add unnecessary complexity and vulnerability.
Authorization & Privilege Escalation
- User privileges are the operations a user is permitted to perform within a system. These depend on the user's role and context, including actions like reading, writing files, installing/removing software, or managing accounts.
- Phishing for user credentials does not directly break the authorization mechanism, but instead compromises the confidentiality property of the system.
- Compromising a piece of software running as root to gain root privileges breaks the authorization mechanism by granting unauthorized access.
- If an attacker gains the right to change another user's password, the authorization framework is compromised as it grants excessive privileges.
- A privilege escalation occurs when an attacker manipulates a system to obtain higher-level privileges.
Role-Based Access Control (RBAC)
- RBAC is an access control model that allows access based on functions a user is permitted to perform.
- Role-based access controls are defined by functions or roles, and users are assigned these roles. Examples are: administrator, manager, department manager, or employee. These roles determine access levels to data and features.
- A use case of RBAC is in a company database with financial data. The administrator has full database access followed by progressively narrowed access down to employees, only seeing their data.
Attribute-Based Access Control (ABAC)
- ABAC allows permissions based on dynamic attributes, including those tied to time of day or context.
- RBAC is stricter and roles are static, where ABAC is more flexible and allows user permissions to change based on real-time conditions.
- A potential disadvantage of ABAC is the complexity of changing permissions based on numerous attributes.
- RBAC-A combines static roles with dynamic attributes in order to avoid ABAC's complexity.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). This quiz covers various aspects of these access control models, including their advantages, disadvantages, and components of the Trusted Computing Base (TCB). Challenge yourself to match roles with access levels and understand important security principles.