Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CYB1UofI_FISCH3.3

Implementing Access Controls

QuestionAnswer
what are the two main methods of implementing access controls access control lists and capabilities
what do both access control lists and capabilities have strengths and weaknesses
describe how access control lists and capabilities relate to each other when they carry out the four basic tasks: allowing access, denying access, limited access, revoking access there are different ways of carrying out the four basic tasks
what is an access control list are lists containing information about what kind of access certain parties are allowed to have to a given system
what does ACLs stand for access control list
how is access control list pronounced "ackles"
what do we see ACLs often implemented as part of application software or operating systems & in the firmware of some hardware appliances (network infrastructure devices)
how are ACLs concepts extended into the physical world through software systems that control physical resources (badge readers for door control systems)
Describe how the following ACL works (Figure 3-2) Alice | Allow Bob | Deny Alice is allowed access to the resource, while Bob is specifically denied access
in larger implementations what can become quite complex ACLs
what do organizations commonly use ACLs for to control access in the file systems on which their operating systems run and to control the flow of traffic in the networks to which their systems are attached
what are the two types of ACLs File System ACLs Network ACLs
how many types of permissions are in the ACLs in most file systems three
what are the types of permissions that are in the ACLs in most file systems read, write, execute
what are permissions the authorizations that allow access to specific resources in a specific manner
what is the read permission for a file system ACL allows a user to access the contents of a file or directory
what is the write permission for a file system ACL allows a user to write to a file or directory
what is the execute permission for a file system ACL allows a user to execute the contents of the file if that file contains either a program or a script capable of running on the system in question
True or False: A file or directory may also have multiple ACLs attached to it True
Give an example in a Unix like operating system where a file or directory might have multiple ACLs attached to it a given file might have separate access lists for specific users or groups. the system might give a certain individual user specific permissions, a certain group of users different permissions, and any other authenticated users a third set of permissions
what is an example of in UNIX like operating systems a given file might have separate access lists for specific users or groups: P1 system system might give a certain individual user (like a dev) specific read, write and execute permissions
what is an example of in UNIX like operating systems a given file might have separate access lists for specific users or groups: P2 group a certain group of users (entire dev group) different read, write, and execute permissions
what is an example of in UNIX like operating systems a given file might have separate access lists for specific users or groups: P3 other authenticated user any other authenticated users a third set of read, write and execute permissions
on linux based operating systems you can view these three sets of permissions by issuing the following command ls -la
what does ls-la do shows the permission displayed in the system
what does each line represent after executing the ls-la command (Figure 3-3) represents the permissions for an individual file
what is an example of the permissions for the first file (ucf.conf) displayed as (Figure 3-3) -rw-r--r--
how do we interpret the permission "-rw-r--r--" divide into the following sections - | r w - | r - - | r - -
what does the first character of the permission generally represent the file type
in the first character of the permission what does - represent a regular file
in the first character of the permission what does d represent a directory
what does the second segment of the permission represent the user who owns the file permissions
what does it mean when the second segment of the permission is set to r w - the user can read and write to the file but cannot execute it
what does the third segment of the permission represent group permissions
what does it mean when the third segment of the permission is set to r - - meaning that members of the group that was given ownership of the file can read it but not write or execute it
what is the last segment of the permission represent other
what does it mean when the last segment of the permission is set to r - - meaning that anyone who is not the user who owns the file or in the group that owns the file can also read it but not write or execute it
in Linux how do permissions apply for a user the user permissions apply to a single user only
in Linux how do permissions apply for a group the group permissions apply to a single group
what happens by using sets of file permissions you can control access to the operating systems and applications that use your file systems
True or False: Most file systems use systems that are similar to the Linux/Unix system for assigning permissions True
Created by: user-1830624
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards