7. Access Control (MAC) Flashcards

(54 cards)

1
Q

What is Mandatory Access Control (MAC)?

A

An access control model where the system enforces policies based on labels and clearances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does MAC differ from DAC?

A

MAC is system-controlled; DAC is user-controlled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where is MAC commonly used?

A

Government and military environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are sensitivity labels in MAC?

A

Classifications assigned to resources (e.g., Secret, Top Secret).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are security clearances in MAC?

A

Authorization levels assigned to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When is access granted in MAC?

A

When clearance meets or exceeds sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is centralized policy management in MAC?

A

Policies are managed and enforced by the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a major advantage of MAC security?

A

Provides strong protection for sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why does MAC support compliance?

A

It enforces strict standardized policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a major disadvantage of MAC inflexibility?

A

Permissions are difficult to change dynamically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is MAC hard to administer?

A

Clearances and labels are complex to manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is user autonomy limited in MAC?

A

Users cannot change permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Bell-LaPadula (BLP) model?

A

A confidentiality-focused security model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main goal of BLP?

A

Prevent unauthorized disclosure of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do security levels represent in BLP?

A

Data classification and user clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a subject in BLP?

A

An active entity (user or process).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an object in BLP?

A

A passive data container.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the Simple Security Property?

A

No Read Up (NRU).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does No Read Up mean?

A

Lower-level users cannot read higher-level data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Star (*) Property in BLP?

A

No Write Down (NWD).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does No Write Down mean?

A

Higher-level users cannot write to lower-level data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why does BLP prevent write down?

A

To stop data leakage to lower levels.

23
Q

What is the Discretionary Security Property (DSP)?

A

Allows limited DAC within MAC.

24
Q

What is a main advantage of BLP?

A

Strong confidentiality guarantees.

25
Why is BLP good for hierarchical systems?
It matches military-style classifications.
26
What is a major limitation of BLP?
It does not protect data integrity.
27
Why is BLP unsuitable for dynamic systems?
Security levels are static.
28
What is the Biba model?
An integrity-focused security model.
29
What is the main goal of Biba?
Prevent unauthorized data modification.
30
How does Biba differ from BLP?
Biba focuses on integrity; BLP on confidentiality.
31
What are integrity levels in Biba?
Trust levels assigned to users and data.
32
What is the Simple Integrity Property?
No Read Down (NRD).
33
What does No Read Down mean in Biba?
High-integrity subjects cannot read low-integrity data.
34
What is the Star Integrity Property?
No Write Up (NWU).
35
What does No Write Up mean?
Low-integrity subjects cannot write to high-integrity data.
36
Why does Biba prevent write up?
To prevent corruption of trusted data.
37
What is the Invocation Property?
Low-integrity subjects cannot invoke high-integrity subjects.
38
Why is invocation restricted?
To prevent contamination of trusted processes.
39
What is an advantage of Biba?
Ensures data reliability.
40
Where is Biba commonly used?
Financial and healthcare systems.
41
What is a limitation of Biba confidentiality?
It does not protect secrecy.
42
Why is Biba less flexible?
Strict integrity rules limit collaboration.
43
What is the Chinese Wall model?
A model that prevents conflicts of interest.
44
What problem does Chinese Wall address?
Conflicts of interest between clients.
45
What are conflict of interest classes?
Groups of related sensitive data.
46
What are the rules in Chinese Wall?
1. No Read Conflict (cannot read data from competing groups) 2. No Write Conflict (cannot write data from competing groups)
47
How does Chinese Wall enforce separation?
By building barriers after initial access.
48
What makes Chinese Wall dynamic?
Access depends on past actions.
49
Where is Chinese Wall commonly used?
Finance, law, consulting.
50
What is a main advantage of Chinese Wall?
Prevents unethical information sharing.
51
What is a major limitation of Chinese Wall?
Complex to implement.
52
Why can Chinese Wall reduce productivity?
It may block necessary access.
53
Does Chinese Wall ensure confidentiality?
No, it focuses on conflict prevention.
54
Does Chinese Wall ensure integrity?
No, it focuses on conflict prevention.