5. Access Control (DAC) Flashcards

(44 cards)

1
Q

What is authorization in access control?

A

Restricting the actions of authenticated users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does authorization differ from authentication?

A

Authentication verifies identity; authorization checks permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is authorization more fine-grained than authentication?

A

Authentication is binary, while authorization defines multiple permission levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the main access control models.

A

DAC, RBAC, ABAC, and MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Discretionary Access Control (DAC)?

A

A model where resource owners decide who can access resources and with what permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who controls permissions in DAC?

A

The owner of the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What makes DAC ‘discretionary’?

A

Users can pass their access rights to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give an example of DAC.

A

File owners setting read/write permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a benefit of DAC flexibility?

A

Owners can set fine-grained permissions for objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is DAC considered efficient?

A

Users can grant access quickly and easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is DAC easy to manage?

A

Admins mainly assign privileges using ACLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a major security weakness of DAC?

A

Users may grant overly broad or unsafe permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why does DAC have low visibility?

A

Permissions are hard to monitor centrally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a maintenance problem in DAC?

A

Outdated ACLs may include ex-employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an access control matrix (ACM)?

A

A table mapping subjects to objects and their permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a subject in ACM?

A

An entity that accesses resources (user or process).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an object in ACM?

A

A system resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do rows represent in an ACM?

19
Q

What do columns represent in an ACM?

20
Q

What is stored in each ACM cell?

A

Allowed permissions for a subject-object pair.

21
Q

What do r, w, x represent?

A

Read, Write, Execute.

22
Q

Why is a full ACM impractical?

A

It becomes too large to manage efficiently.

23
Q

What are the two main ACM representations?

A

ACLs and C-lists (capabilities).

24
Q

What is an Access Control List (ACL)?

A

A list of users and permissions for a specific object.

25
How are ACLs derived from ACM?
By storing columns with each object.
26
When is an ACL checked?
When an object is accessed.
27
Give an example of ACL format.
(User, permission).
28
What is a capability (C-list)?
A list of objects and permissions for a subject.
29
How are C-lists derived from ACM?
By storing rows with each subject.
30
When is a C-list checked?
When a subject requests access.
31
Give an example of C-list format.
(Object, permission).
32
What is the main difference between ACLs and C-lists?
ACLs map objects to users; C-lists map users to objects.
33
Why is this ACL vs C-list difference important?
It affects how associations and security are managed.
34
What is an advantage of capabilities?
User-resource associations are built into the system.
35
Why are capabilities favored in research?
They offer security and management advantages.
36
What is the purpose of splitting the ACM?
To improve authorization performance.
37
How can ACM be split?
By columns (ACLs) or rows (C-lists).
38
Why treat programs as subjects in ACM?
To restrict how data can be modified.
39
What is the goal of restricting accounting data modification?
To prevent corruption using controlled software.
40
Why can administrators bypass ACM protection?
They can replace trusted programs.
41
What is the confused deputy problem?
A program misuses its privileges on behalf of another user.
42
What causes the confused deputy problem?
Programs having more privileges than needed.
43
How does ACM illustrate confused deputy?
A low-privilege user exploits a high-privilege program.
44
How can access control help prevent confused deputy?
By separating and limiting privileges.