20s-2550: L17 Access Control and Social Engineering
Materials
You can use the L17 slides (pdf) to take notes. L17 annotated slides (pdf) from lecture have my drawings.
Please see piazza@439 for a link to the recorded video.
Summary
Authorization is what happens after authentication.
-
Principle-Subject-Object: what are these? how are they used to make authorization decisions?
-
There are two main types, discretionary access control and manditory access control.
-
Within discretionary systems, there are ACLs, unix-style permissions, and also capability-based systems. Whereas an ACL corresponds to setting the “columns” of an access control matrix, a capability-based system corresponds to setting the “rows” of the matrix.
-
There are many advantages of a capability-based system. (Know them). Android and IOS use this model.
-
However, DACs still have simple failure cases. High-security systems need to implement manditory access control. The Bell-Lapadula (BPL) model is the basis for such MAC systems: “no read up, no write down.” Understand how this model works. How can it be used to implement a need-to-know policy? BPL only provides confidentiality; the corresponding Biba model implements integrity in a MAC. How does it work?
-
Introduce a new failure of operation: the social engineering attack.