Podcast
Questions and Answers
What does RBAC stand for?
What does RBAC stand for?
In an RBAC system, a department manager has the right to modify any data within their department.
In an RBAC system, a department manager has the right to modify any data within their department.
False
What is a major disadvantage of ABAC as mentioned in the content?
What is a major disadvantage of ABAC as mentioned in the content?
Changing user permissions
In RBAC, user permissions are based solely on the user's assigned __________.
In RBAC, user permissions are based solely on the user's assigned __________.
Signup and view all the answers
Match the role in an RBAC system with their corresponding access level:
Match the role in an RBAC system with their corresponding access level:
Signup and view all the answers
Which of the following is true about ABAC?
Which of the following is true about ABAC?
Signup and view all the answers
What does the Trusted Computing Base (TCB) primarily consist of?
What does the Trusted Computing Base (TCB) primarily consist of?
Signup and view all the answers
RBAC allows for user permission adjustments based solely on changes in user roles.
RBAC allows for user permission adjustments based solely on changes in user roles.
Signup and view all the answers
How does ABAC differ in flexibility compared to RBAC?
How does ABAC differ in flexibility compared to RBAC?
Signup and view all the answers
A larger TCB provides less flexibility for developers.
A larger TCB provides less flexibility for developers.
Signup and view all the answers
Name one advantage of a small TCB.
Name one advantage of a small TCB.
Signup and view all the answers
Three elements that are inside the TCB are: Kernel, _____, and the cryptography component.
Three elements that are inside the TCB are: Kernel, _____, and the cryptography component.
Signup and view all the answers
Which of the following should probably not be included in the TCB?
Which of the following should probably not be included in the TCB?
Signup and view all the answers
The biggest threat to the TCB is the software it runs.
The biggest threat to the TCB is the software it runs.
Signup and view all the answers
What is a supply-chain attack?
What is a supply-chain attack?
Signup and view all the answers
Match the elements with their description regarding the TCB:
Match the elements with their description regarding the TCB:
Signup and view all the answers
What should the Trusted Computing Base (TCB) be in relation to a system's security needs?
What should the Trusted Computing Base (TCB) be in relation to a system's security needs?
Signup and view all the answers
The principle of least privilege suggests that users should be granted maximum privileges to perform their tasks.
The principle of least privilege suggests that users should be granted maximum privileges to perform their tasks.
Signup and view all the answers
What can be affected if the authorization mechanism is compromised?
What can be affected if the authorization mechanism is compromised?
Signup and view all the answers
If a user can perform administrative tasks without proper authorization, it indicates a possible _____ in the system's security.
If a user can perform administrative tasks without proper authorization, it indicates a possible _____ in the system's security.
Signup and view all the answers
Match the following user roles with their respective privileges:
Match the following user roles with their respective privileges:
Signup and view all the answers
Why is confidentiality important in a system?
Why is confidentiality important in a system?
Signup and view all the answers
A user granted unauthorized access to change another user's password indicates a well-functioning authorization mechanism.
A user granted unauthorized access to change another user's password indicates a well-functioning authorization mechanism.
Signup and view all the answers
What does the term 'privilege escalation' refer to in system security?
What does the term 'privilege escalation' refer to in system security?
Signup and view all the answers
What are the two concepts that RBAC-A utilizes?
What are the two concepts that RBAC-A utilizes?
Signup and view all the answers
In RBAC-A, permissions are determined at the time of role definition.
In RBAC-A, permissions are determined at the time of role definition.
Signup and view all the answers
Name one of the MAC systems used by Linux.
Name one of the MAC systems used by Linux.
Signup and view all the answers
In ABAC, the rule format includes 'If the role is ______ and working day is ______...'
In ABAC, the rule format includes 'If the role is ______ and working day is ______...'
Signup and view all the answers
Match the following MAC systems with their characteristics:
Match the following MAC systems with their characteristics:
Signup and view all the answers
Which statement accurately describes SELinux?
Which statement accurately describes SELinux?
Signup and view all the answers
AppArmor restricts applications based on roles.
AppArmor restricts applications based on roles.
Signup and view all the answers
What type of permissions can be added or removed in RBAC-A?
What type of permissions can be added or removed in RBAC-A?
Signup and view all the answers
Signup and view all the answers
Signup and view all the answers
Signup and view all the answers
Study Notes
Trusted Computing Base (TCB)
- TCB is the combination of hardware, software, and controls that work together to enforce computer security policies.
- A larger TCB offers broader security coverage through more comprehensive security mechanisms (e.g., logging, encryption). This allows for more flexible use due to numerous built-in functions.
- A smaller TCB is easier to protect because it has fewer components, which decreases vulnerabilities. Smaller TCBs are also portable.
- Three common elements within a TCB include the kernel, authentication mechanisms (biometrics/passwords), and cryptography components (key management and encryption).
- Three elements that should not typically be part of a TCB include third-party applications, activity surveillance mechanisms (like loggers), and unnecessary user applications. These add unnecessary complexity and vulnerability.
Authorization & Privilege Escalation
- User privileges are the operations a user is permitted to perform within a system. These depend on the user's role and context, including actions like reading, writing files, installing/removing software, or managing accounts.
- Phishing for user credentials does not directly break the authorization mechanism, but instead compromises the confidentiality property of the system.
- Compromising a piece of software running as root to gain root privileges breaks the authorization mechanism by granting unauthorized access.
- If an attacker gains the right to change another user's password, the authorization framework is compromised as it grants excessive privileges.
- A privilege escalation occurs when an attacker manipulates a system to obtain higher-level privileges.
Role-Based Access Control (RBAC)
- RBAC is an access control model that allows access based on functions a user is permitted to perform.
- Role-based access controls are defined by functions or roles, and users are assigned these roles. Examples are: administrator, manager, department manager, or employee. These roles determine access levels to data and features.
- A use case of RBAC is in a company database with financial data. The administrator has full database access followed by progressively narrowed access down to employees, only seeing their data.
Attribute-Based Access Control (ABAC)
- ABAC allows permissions based on dynamic attributes, including those tied to time of day or context.
- RBAC is stricter and roles are static, where ABAC is more flexible and allows user permissions to change based on real-time conditions.
- A potential disadvantage of ABAC is the complexity of changing permissions based on numerous attributes.
- RBAC-A combines static roles with dynamic attributes in order to avoid ABAC's complexity.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). This quiz covers various aspects of these access control models, including their advantages, disadvantages, and components of the Trusted Computing Base (TCB). Challenge yourself to match roles with access levels and understand important security principles.