click below
click below
Normal Size Small Size show me how
CYB1UofI_FISCH3.3
Implementing Access Controls
| Question | Answer |
|---|---|
| what are the two main methods of implementing access controls | access control lists and capabilities |
| what do both access control lists and capabilities have | strengths and weaknesses |
| describe how access control lists and capabilities relate to each other when they carry out the four basic tasks: allowing access, denying access, limited access, revoking access | there are different ways of carrying out the four basic tasks |
| what is an access control list | are lists containing information about what kind of access certain parties are allowed to have to a given system |
| what does ACLs stand for | access control list |
| how is access control list pronounced | "ackles" |
| what do we see ACLs often implemented as | part of application software or operating systems & in the firmware of some hardware appliances (network infrastructure devices) |
| how are ACLs concepts extended into the physical world | through software systems that control physical resources (badge readers for door control systems) |
| Describe how the following ACL works (Figure 3-2) Alice | Allow Bob | Deny | Alice is allowed access to the resource, while Bob is specifically denied access |
| in larger implementations what can become quite complex | ACLs |
| what do organizations commonly use ACLs for | to control access in the file systems on which their operating systems run and to control the flow of traffic in the networks to which their systems are attached |
| what are the two types of ACLs | File System ACLs Network ACLs |
| how many types of permissions are in the ACLs in most file systems | three |
| what are the types of permissions that are in the ACLs in most file systems | read, write, execute |
| what are permissions | the authorizations that allow access to specific resources in a specific manner |
| what is the read permission for a file system ACL | allows a user to access the contents of a file or directory |
| what is the write permission for a file system ACL | allows a user to write to a file or directory |
| what is the execute permission for a file system ACL | allows a user to execute the contents of the file if that file contains either a program or a script capable of running on the system in question |
| True or False: A file or directory may also have multiple ACLs attached to it | True |
| Give an example in a Unix like operating system where a file or directory might have multiple ACLs attached to it | a given file might have separate access lists for specific users or groups. the system might give a certain individual user specific permissions, a certain group of users different permissions, and any other authenticated users a third set of permissions |
| what is an example of in UNIX like operating systems a given file might have separate access lists for specific users or groups: P1 system | system might give a certain individual user (like a dev) specific read, write and execute permissions |
| what is an example of in UNIX like operating systems a given file might have separate access lists for specific users or groups: P2 group | a certain group of users (entire dev group) different read, write, and execute permissions |
| what is an example of in UNIX like operating systems a given file might have separate access lists for specific users or groups: P3 other authenticated user | any other authenticated users a third set of read, write and execute permissions |
| on linux based operating systems you can view these three sets of permissions by issuing the following command | ls -la |
| what does ls-la do | shows the permission displayed in the system |
| what does each line represent after executing the ls-la command (Figure 3-3) | represents the permissions for an individual file |
| what is an example of the permissions for the first file (ucf.conf) displayed as (Figure 3-3) | -rw-r--r-- |
| how do we interpret the permission "-rw-r--r--" | divide into the following sections - | r w - | r - - | r - - |
| what does the first character of the permission generally represent | the file type |
| in the first character of the permission what does - represent | a regular file |
| in the first character of the permission what does d represent | a directory |
| what does the second segment of the permission represent | the user who owns the file permissions |
| what does it mean when the second segment of the permission is set to r w - | the user can read and write to the file but cannot execute it |
| what does the third segment of the permission represent | group permissions |
| what does it mean when the third segment of the permission is set to r - - | meaning that members of the group that was given ownership of the file can read it but not write or execute it |
| what is the last segment of the permission represent | other |
| what does it mean when the last segment of the permission is set to r - - | meaning that anyone who is not the user who owns the file or in the group that owns the file can also read it but not write or execute it |
| in Linux how do permissions apply for a user | the user permissions apply to a single user only |
| in Linux how do permissions apply for a group | the group permissions apply to a single group |
| what happens by using sets of file permissions | you can control access to the operating systems and applications that use your file systems |
| True or False: Most file systems use systems that are similar to the Linux/Unix system for assigning permissions | True |