U3.1 Access Control

Beschreibung

Masters Comp Sec Mindmap am U3.1 Access Control, erstellt von Craig Parker am 13/11/2013.
Craig Parker
Mindmap von Craig Parker, aktualisiert more than 1 year ago
Craig Parker
Erstellt von Craig Parker vor etwa 11 Jahre
36
0

Zusammenfassung der Ressource

U3.1 Access Control
  1. Permit or deny user access to computer resources according to redefined security policy
    1. Who/What (system/user) is allowed to read and write to system resources
    2. Reference Monitor
      1. Establishes validity of access requests
        1. REFERENCE MONITOR > either grants or denies request
          1. Subject tries an Access request >
            1. System decision
              1. Part of the OS. Its integrity is extremely Important
          2. Subjects
            1. Can be user or process
              1. Will try gain access
                1. May be represented by more than 1 principal
                2. Objects
                  1. passive entity / resource in a computer system. IE:file / directory.
                  2. Principal
                    1. attribute or property associated with a subject
                      1. User ID, process running on behalf of the user
                        1. Subject may be represented by more than 1 principal
                    2. Unix has 3 Access Operations
                      1. read (r)
                        1. write (w)
                          1. does not include read
                          2. execute (e)
                            1. For file access meanings are clear
                              1. For directory access
                                1. read
                                  1. list the contents of the directory
                                  2. write
                                    1. create or rename the files in the directory
                                    2. execute
                                      1. enter the directory.
                                    3. For directory permissions are listed consecutivly in a row
                                      1. IE drwxr-xr--
                                        1. d indicates driectory, the next 3 are owners positions, following 3 groups permissions, remaining = everyone elses permissions
                                  3. Bell-LaPladula
                                    1. Assigns security labels
                                      1. Policy that information may not flow downwards from a high level to a lower level entity
                                      2. Observe mode
                                        1. read / write
                                        2. Alter mode
                                          1. append / write
                                        3. Access Operations - Interaction between a subject and an object that causes a flow of information
                                          1. 4 Primitive Access Operations
                                            1. Read
                                              1. Can observe and object. Read only
                                              2. Write
                                                1. Able to read and write or alter/delete objects
                                                  1. Write includes read
                                                2. Execute
                                                  1. Allows the subject to use the object without reading or writing
                                                    1. Subject runs a program, or access a crypto key
                                                  2. Append
                                                    1. Sometimes = blind write or write only. subject allowed to alter the object without observing contents
                                                Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                ähnlicher Inhalt

                                                U2.1 Comp Sec: deals with prevention & detection of unauthorised actions by users of a comp system
                                                Craig Parker
                                                U3.2 Access Control Structures
                                                Craig Parker
                                                U3. Labels & Access Control
                                                Craig Parker
                                                U2.2 Fundamentals
                                                Craig Parker
                                                U3.3 Administration
                                                Craig Parker
                                                U4. Security Models & Policy
                                                Craig Parker
                                                U4. Bell-LaPladula
                                                Craig Parker
                                                U4. Biba
                                                Craig Parker
                                                U4. Further Aspects of BLP
                                                Craig Parker
                                                U4. Harrison–Ruzzo–Ullman
                                                Craig Parker
                                                U4. Chinese Wall
                                                Craig Parker