What is authorization in access control?
Restricting the actions of authenticated users.
How does authorization differ from authentication?
Authentication verifies identity; authorization checks permissions.
Why is authorization more fine-grained than authentication?
Authentication is binary, while authorization defines multiple permission levels.
Name the main access control models.
DAC, RBAC, ABAC, and MAC.
What is Discretionary Access Control (DAC)?
A model where resource owners decide who can access resources and with what permissions.
Who controls permissions in DAC?
The owner of the resource.
What makes DAC ‘discretionary’?
Users can pass their access rights to others.
Give an example of DAC.
File owners setting read/write permissions.
What is a benefit of DAC flexibility?
Owners can set fine-grained permissions for objects.
Why is DAC considered efficient?
Users can grant access quickly and easily.
Why is DAC easy to manage?
Admins mainly assign privileges using ACLs.
What is a major security weakness of DAC?
Users may grant overly broad or unsafe permissions.
Why does DAC have low visibility?
Permissions are hard to monitor centrally.
What is a maintenance problem in DAC?
Outdated ACLs may include ex-employees.
What is an access control matrix (ACM)?
A table mapping subjects to objects and their permissions.
What is a subject in ACM?
An entity that accesses resources (user or process).
What is an object in ACM?
A system resource.
What do rows represent in an ACM?
Subjects.
What do columns represent in an ACM?
Objects.
What is stored in each ACM cell?
Allowed permissions for a subject-object pair.
What do r, w, x represent?
Read, Write, Execute.
Why is a full ACM impractical?
It becomes too large to manage efficiently.
What are the two main ACM representations?
ACLs and C-lists (capabilities).
What is an Access Control List (ACL)?
A list of users and permissions for a specific object.