What is the difference between authentication and authorization?
Authentication means verifying credentials
Authorization means granting permission to resources
What are the different access control policies?
What is Discretionary access control (DAC)?
Controls access based on the identity of the requestor and on access rules stating what requestors are allowed to do.
What is Mandatory access control (MAC)?
Controls access based on comparing security labels with security clearances.
What is Role-based access control (RBAC)?
Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
What is Attribute-based access control (ABAC)?
Controls access based on attributes of the user, the resource to be accessed, and current environmental conditions.
Attributes contain information that can indicate the class of information, a name, and a value:
Policies are a set of rules that govern allowable behavior.
What is the general approach to implementing Discretionary Access Control?
Access matrix.
One side of matrix with subjects and one with objects.
The intersection of a subject and object in the matrix contains access rights the subject has on the object (read, write, etc.). The access matrix can be decomposed into Access Control Lists (ACL) or capability tickets.
UNIX file access control TO DO
TO DO
he didnt explain this in the lecture, but explicitly said that it could be on the exam
How is Role-based access control often implemented?
Access matrix.
Exactly the same as Discretionary Access Control, but with roles instead of subjects. Users are grouped into roles. A user can have one or more roles.
Roles can be organized in a hierarchy. Subordinate jobs may have a subset of the access rights of a superior job function.
Constrains can be added to force relationships between roles. For example: a user can not have role 1 and role 2 at the same time.
What is the Bell-LaPadula model?
A computer security model.
Subjects and objects are assigned security classes. The security classes form a strict hierarchy and are referred to as security levels.
Example: top secret > confidential > unclassified
A subject has a security clearance.
An object has a security classification.
What are the four access modes in the Bell-LaPadula model?
Read
Append
Write
Execute
What properties must a Multilevel Security (MLS) system enforce?
What is the Biba Integrity Model?
Similar to Bel-LaPadula, but integrity and not confidentiality.
Access modes: modify, observe, execute, invoke.
What is the Chinese Wall Model?
Once a subject accesses information from a dataset, access to other Conflict of Interest (CI) classes are blocked.
A subject s can access an object o only if at least one of the following is true:
TO DO, not covered in lectures:
to do