Access control
🔐 1. Access Control Overview
Access control defines who (user, system, process) can access what (data, system, resource), when, and how. It's enforced via a combination of hardware, software, and administrative policies to protect confidentiality, integrity, and availability (CIA Triad) of resources.
🔄 2. Core Access Control Functions
✅ Authentication
-
Verifies identity.
-
Techniques:
-
Knowledge-based: passwords, PINs.
-
Possession-based: tokens, smart cards.
-
Inherence-based: biometrics (fingerprint, iris scan).
-
Location-based: IP address, geolocation.
-
Time-based: access allowed only during business hours.
-
Multifactor Authentication (MFA): combination of the above.
-
✅ Authorization
-
Determines what authenticated users are allowed to do.
-
Implemented using Access Control Lists (ACLs), capabilities, or policy engines.
-
Fine-grained vs coarse-grained:
-
Coarse-grained: broad roles (e.g., "admin," "user").
-
Fine-grained: resource-level or attribute-based controls.
-
✅ Accounting (Auditing)
-
Logging and monitoring actions.
-
Uses:
-
Compliance (e.g., HIPAA, GDPR).
-
Forensic investigations.
-
Detecting insider threats.
-
🧩 3. Access Control Models (Deep Dive)
A. Discretionary Access Control (DAC)
-
User-controlled: owner decides access rights.
-
Based on UID/GID and file permission bits (e.g., chmod 755 in UNIX).
-
Weakness: vulnerable to malware or user error.
B. Mandatory Access Control (MAC)
-
System-enforced policy based on security labels (e.g., Top Secret, Confidential).
-
Subjects and objects are assigned labels; rules determine allowable interactions.
-
Used in:
-
SELinux, TrustedBSD, Windows Mandatory Integrity Control (MIC).
-
-
Bell-LaPadula model (confidentiality) and Biba model (integrity) often used:
-
Bell-LaPadula: No Read Up, No Write Down.
-
Biba: No Write Up, No Read Down.
-
C. Role-Based Access Control (RBAC)
-
Permissions assigned to roles, roles assigned to users.
-
Simplifies admin and supports least privilege.
-
Example:
Role: Finance_Analyst
Permissions: Read_Payroll, Generate_Report
User: alice@company.com → Role: Finance_Analyst
Types:
-
Flat RBAC: simple role to permission mapping.
-
Hierarchical RBAC: roles inherit from others (e.g., Admin > Manager > Employee).
-
Constraint-based RBAC: rules like separation of duties (SoD).
D. Attribute-Based Access Control (ABAC)
-
Uses attributes of users, resources, environment.
-
Policies are written in languages like XACML (eXtensible Access Control Markup Language).
-
Example policy:
If user.department == "HR" AND user.clearance >= 3 AND request.time < 6pm
THEN Permit access to Resource "Employee_Records"
-
Supports context-aware and dynamic access.
E. Rule-Based Access Control
-
Access is controlled by if-then rules, often in firewalls, routers, or network access control (NAC) systems.
-
Example:
IF source IP == 10.0.0.0/24 AND destination port == 443
THEN allow traffic
🛡️ 4. Policy Enforcement and Decision Points
-
Policy Decision Point (PDP): Makes the decision (e.g., ABAC engine).
-
Policy Enforcement Point (PEP): Enforces the decision (e.g., file system, firewall).
-
Policy Administration Point (PAP): Manages policies.
-
Policy Information Point (PIP): Gathers attributes/data (e.g., HR database, Active Directory).
🏢 5. Enterprise Access Control Implementation
A. Identity and Access Management (IAM) Systems
-
Centralized management of users and policies.
-
Examples: Okta, Microsoft Azure AD, Ping Identity, ForgeRock.
B. Access Control Technologies
-
LDAP/AD: Directory services for user identity and access rights.
-
OAuth 2.0: Authorization for APIs and web apps.
-
SAML: SSO and federated identity.
-
Kerberos: Ticket-based network authentication (common in Windows domains).
-
Zero Trust Architecture: "Never trust, always verify."
C. Cloud Access Control
-
Cloud providers offer native services:
-
AWS IAM: policies, roles, and service permissions.
-
Azure RBAC: assign roles at subscription/resource level.
-
GCP IAM: bindings between members and roles.
-
⚠️ 7. Common Access Control Risks
-
Privilege escalation: improper authorization checks.
-
Over-permissioning: granting more access than needed.
-
Lack of auditing: hard to detect misuse.
-
Stale accounts: access not revoked after user leaves.
Real-world use cases where access control is implemented to protect sensitive information and systems:
1. Corporate Network Access Control
In businesses, access control is used to restrict access to internal systems and data based on the roles of employees. For example, an HR system may only be accessible to HR personnel and executives, while accounting software is restricted to finance employees. Access control is typically enforced using Role-Based Access Control (RBAC) or Attribute-Based Access Control (ABAC), where users are granted access based on their role, department, or other attributes.
2. Cloud Service Access
In cloud computing environments, organizations implement access control to ensure that employees, contractors, or clients only access the resources they are authorized to use. For example, in a cloud storage service like AWS or Azure, access can be controlled using Identity and Access Management (IAM) policies that define who can access specific virtual machines, databases, or storage buckets. Multi-factor authentication (MFA) is also often enforced to provide an additional layer of security.
3. Healthcare Systems Access Control
In healthcare, access control is essential for protecting patient data and ensuring compliance with regulations like HIPAA (Health Insurance Portability and Accountability Act). Medical staff, administrators, and IT personnel may have different levels of access to electronic health records (EHR). A doctor may be allowed to view a patient's medical history, but a receptionist might only have permission to schedule appointments. Least Privilege Access is often implemented to limit access to the minimal amount of information necessary for the role.
4. Financial Services and Banking
Banks and financial institutions employ access control mechanisms to safeguard customer information and prevent fraud. For instance, a customer service representative may only be allowed to access basic account details (e.g., balance), while an account manager has access to more detailed information (e.g., transaction history). Separation of Duties (SoD) is commonly used in financial institutions, where access to certain systems is divided to prevent any single individual from having too much control over financial transactions.
5. Physical Security Systems (Building Access Control)
In physical security, access control is implemented to restrict who can enter specific buildings, floors, or rooms. Employees may use keycards, biometric scans, or PIN codes to gain access to certain areas. For example, only IT staff might have access to a server room that houses sensitive infrastructure, while regular employees only have access to office spaces. The system can log each access attempt and notify security personnel if unauthorized access is attempted.
6. E-commerce and Online Accounts
For online platforms like e-commerce websites, access control ensures that users can only access their accounts and personal information. A login system with a username and password is a basic form of access control. For more sensitive operations, like making a purchase or viewing financial transactions, two-factor authentication (2FA) may be required. This adds an extra layer of protection by requiring users to verify their identity with something they know (password) and something they have (e.g., a phone or hardware token).
7. Educational Institutions and Learning Management Systems (LMS)
Universities and schools use access control to ensure that only authorized users can access certain learning materials, grades, or exam results. In a Learning Management System (LMS), students might only have access to their own grades and assignments, while teachers or professors can view and grade all students' submissions. Time-based access control might also be used, where students can only access certain materials during a specific time frame, like when an exam window is open.
8. Government and Military Systems
Government agencies and military organizations use access control to protect classified information and enforce national security. For example, Top Secret information may be restricted to individuals with the proper security clearance. Systems like Public Key Infrastructure (PKI) are used to manage digital certificates and ensure that only authorized personnel can access highly sensitive data. Mandatory Access Control (MAC) is often used in these environments, where the system itself enforces strict rules on who can access what information.
9. Content Management Systems (CMS) for Websites
In content management systems like WordPress or Joomla, access control is used to allow different levels of interaction with the website. A content editor might have the ability to write and edit blog posts but cannot change the site's design or access other users' data. Administrator-level access might be restricted to only a few trusted individuals, who can manage plugins, themes, and user roles. Granular access control is used to ensure that users have the least amount of access required to perform their tasks.
10. Internet of Things (IoT) Device Access Control
As IoT devices become more integrated into everyday life, access control becomes essential for ensuring that only authorized users can manage devices like smart thermostats, security cameras, and health trackers. For example, the administrator of a home security system may have the ability to view camera feeds and adjust settings, while other users (like family members) may only be able to arm/disarm the system. Strong access control ensures that only trusted individuals can interact with potentially sensitive devices in a home or industrial environment.
In all these cases, access control is an essential measure for securing systems, protecting sensitive data, and ensuring that users or devices can only perform actions that are appropriate for their roles or identities. It is often enforced using various technologies like passwords, biometrics, tokens, and encryption
Bell-LaPadula and Biba models
🔐 Bell-LaPadula Model — Focus on Confidentiality
The Bell-LaPadula (BLP) model is a formal security model developed in the 1970s for enforcing data confidentiality policies in multilevel security systems, such as those used in the military. Its purpose is to prevent unauthorized access to classified information by controlling how data flows between subjects (like users or processes) and objects (like files or databases) that are labeled with different levels of sensitivity.
Security Levels
In this model, both subjects and objects are assigned security classifications. These could be levels such as:
-
Unclassified
-
Confidential
-
Secret
-
Top Secret
The model defines a hierarchical structure where higher levels represent more sensitive data.
Core Rules of Bell-LaPadula
-
Simple Security Property ("No Read Up") A subject is not allowed to read data at a higher security level than their own clearance.
For example, a user with a Confidential clearance cannot read a document marked Secret or Top Secret.
This rule protects against unauthorized disclosure, ensuring users cannot gain access to information they aren't cleared to see. -
*-Property ("Star Property" or "No Write Down") A subject cannot write data to a lower security level than their own.
For example, a process running at Top Secret cannot write to a file labeled Confidential.
This prevents data from being "leaked" or "downgraded" inappropriately — e.g., preventing classified data from being written into a less secure document where others could access it. -
*Strong -Property (optional, stricter) A subject can only read and write at the same level. This is a stricter version, often used where maximum control is required, completely isolating access between different levels.
Summary of Bell-LaPadula Logic
The overall goal of the Bell-LaPadula model is to ensure that information only flows upward, from less sensitive to more sensitive levels, but never downward. That way, a low-clearance user cannot learn secrets, and a high-clearance user cannot accidentally leak them.
This model does not care about integrity (whether data is accurate or trustworthy), and as such, it is not suitable for all environments — only those where protecting secrets is the main concern.
🛡️ Biba Model — Focus on Integrity
The Biba model is essentially the mirror image of Bell-LaPadula. Instead of protecting confidentiality, it focuses entirely on preserving the integrity of information — that is, ensuring that data is trustworthy, accurate, and has not been improperly modified.
Integrity Levels
Just like Bell-LaPadula uses sensitivity labels for secrecy, Biba assigns integrity levels to both subjects and objects. These levels describe the trustworthiness or reliability of users and data.
For example:
-
High Integrity (e.g., system administrator processes)
-
Medium Integrity (e.g., trained staff)
-
Low Integrity (e.g., general users, external input)
Core Rules of Biba
-
Simple Integrity Property ("No Read Down") A subject cannot read data at a lower integrity level.
For instance, a critical process responsible for updating financial records should not read data from an unverified user input file.
This protects the system from being corrupted by untrusted sources. If you read bad data, you might act on bad data — this rule blocks that. -
*-Integrity Property ("No Write Up") A subject cannot write data to a higher integrity level.
For example, a regular user cannot modify operating system files or administrative logs.
This prevents contamination of high-integrity resources by lower-integrity users or processes. -
Invocation Property (optional) A subject can only request services from subjects at its own or lower integrity levels. This further prevents low-integrity processes from influencing high-integrity operations.
Summary of Biba Logic
The Biba model ensures that information only flows downward, from higher-trust sources to lower-trust destinations. This stops low-trust users from tampering with system-critical data, but does not care if secrets leak. It's all about ensuring data hasn't been tampered with — perfect for applications like banking systems, file integrity checkers, and industrial control systems.
Key Conceptual Difference
To summarize in conceptual terms:
-
Bell-LaPadula says: "You can't read secrets above your clearance, and you can't write secrets below your clearance." It's about who sees what.
-
Biba says: "You can't read from untrusted sources, and you can't write to trusted destinations if you're not trustworthy." It's about who changes what.
Each model serves a different security objective:
-
Use Bell-LaPadula where confidentiality is paramount (e.g., military documents).
-
Use Biba where integrity is critical (e.g., medical records, financial data).
🔐 Bell-LaPadula Model – Confidentiality-Focused Examples
🎯 Example 1: Military Document Access
Scenario:
A military system has the following security classifications:
-
Top Secret
-
Secret
-
Confidential
-
Unclassified
Users:
-
General – Clearance: Top Secret
-
Captain – Clearance: Secret
-
Soldier – Clearance: Confidential
Documents:
-
Document A – Top Secret
-
Document B – Secret
-
Document C – Confidential
Application of Rules:
-
Simple Security Property (No Read Up):
-
The Captain (Secret clearance) cannot read Document A (Top Secret).
-
The Soldier (Confidential clearance) cannot read Document B or A.
-
-
*-Property (No Write Down):
-
The General (Top Secret) cannot write to Document B (Secret) or C (Confidential).
-
Why? Because this could lead to leaking Top Secret data into lower-level documents.
-
✅ Allowed: The General can read and write within Top Secret.
❌ Not Allowed: The Captain reading Top Secret (No Read Up), or the General writing to Secret (No Write Down).
🎯 Example 2: Secure Email System
Scenario:
A secure email system assigns classifications to messages and users.
-
User A has "Secret" clearance.
-
User B has "Confidential" clearance.
-
Message M is classified as "Secret".
Application:
-
User B cannot read Message M – because it's a higher classification than their clearance (No Read Up).
-
User A cannot send Message M to User B – because that would be writing Secret data to a Confidential recipient (No Write Down).
🛡️ Biba Model – Integrity-Focused Examples
🎯 Example 1: Medical Records System
Scenario:
A hospital uses an integrity-based model to ensure that only verified personnel can change patient data.
Integrity Levels:
-
Doctor – High Integrity
-
Intern – Medium Integrity
-
Public Kiosk – Low Integrity
Objects:
-
Patient Records – High Integrity
-
Notes for Review – Medium Integrity
-
Online Feedback Form – Low Integrity
Application of Rules:
-
Simple Integrity Property (No Read Down):
-
The Doctor (High Integrity) cannot read data entered via the Public Kiosk (Low Integrity), like symptom checkers or anonymous feedback, because it might be unreliable.
-
-
*-Integrity Property (No Write Up):
-
The Intern (Medium Integrity) cannot write directly to final Patient Records (High Integrity).
-
They must submit notes for review, which a doctor then approves.
-
✅ Allowed: Doctors write to Patient Records; interns write to notes; kiosks write to untrusted input queues.
❌ Not Allowed: Interns writing to records directly; doctors consuming unverified public input.
🎯 Example 2: Software Deployment Pipeline
Scenario:
An organization uses a Biba-based model to protect production environments from untrusted code.
Subjects:
-
Senior Developer – High Integrity
-
Junior Developer – Medium Integrity
-
Automated Web Scraper – Low Integrity
Objects:
-
Production Database – High Integrity
-
Staging Server – Medium Integrity
-
User Feedback Queue – Low Integrity
Application:
-
Senior Developer can write directly to production.
-
Junior Developer can only deploy to staging; a Senior Developer must review and promote the code.
-
Web Scraper can write to the feedback queue but cannot affect any production system.
This ensures that untrusted data or people cannot corrupt high-integrity assets like production systems.
✅ Summary of Examples
-
Bell-LaPadula prevents users from reading data above their clearance and writing data below it, keeping secrets secret.
-
Biba prevents users from reading untrusted data and writing to systems they're not trusted enough to change, protecting integrity.
Clark-Wilson security model
The Clark-Wilson security model is a formal model designed to ensure information integrity, particularly in commercial applications such as banking and accounting. It was introduced by David D. Clark and David R. Wilson in 1987 and focuses on preventing unauthorized or unintended modification of data.
Key Principles of the Clark-Wilson Model
-
Integrity Over Confidentiality:
-
Unlike models such as Bell-LaPadula (which prioritize confidentiality), Clark-Wilson focuses on data integrity—making sure data is accurate and authorized.
-
-
Three Key Concepts:
-
Subjects: Active agents (usually users or programs).
-
Objects: Passive entities (like files or databases).
-
Programs: Also called Transformation Procedures (TPs)—authorized procedures that operate on data.
-
-
Well-Formed Transactions:
-
All modifications to data must occur through a small set of trusted programs (TPs).
-
These programs enforce business rules and are designed to preserve data integrity.
-
-
Separation of Duties:
-
Different roles are required for certifying and executing TPs.
-
Prevents a single individual from both defining and executing a procedure (mitigating fraud).
-
-
Certification and Enforcement Rules:
-
Certification Rules (C-rules):
-
C1: TPs must be certified to ensure they preserve the integrity of the data.
-
C2: Only certified TPs may operate on Constrained Data Items (CDIs).
-
-
Enforcement Rules (E-rules):
-
E1: The system must maintain and enforce lists of authorized users for each TP.
-
E2: The system must log all TP executions for audit purposes.
-
-
-
Data Items:
-
Constrained Data Items (CDIs): Data requiring integrity control.
-
Unconstrained Data Items (UDIs): Data not controlled for integrity (e.g., user input).
-
Integrity Verification Procedures (IVPs): Ensure CDIs are in a valid state.
-
Example (Banking Application):
-
A user can't directly transfer funds between accounts.
-
A TP (like a "Transfer Funds" function) must be used.
-
Only authorized users can invoke that TP.
-
The TP ensures rules like "the total amount remains constant" are enforced.
Summary of Benefits:
-
Ensures business rules are enforced.
-
Promotes auditability through logging.
-
Minimizes insider threats via separation of duties.
🔐 1. Banking System: Funds Transfer
Scenario: A customer wants to transfer $1,000 from Account A to Account B.
-
Unconstrained Data Item (UDI): The customer's input—transfer amount and destination account.
-
Transformation Procedure (TP): A certified function like transfer_funds(A, B, $1000).
-
Constrained Data Items (CDIs): Account balances for A and B.
-
Integrity Verification Procedure (IVP): A periodic audit ensuring no accounts have negative balances unless authorized (e.g., overdraft accounts).
🔎 Clark-Wilson Principles Applied:
-
Customer cannot directly alter balances (data is protected).
-
Only the TP can perform the update.
-
The TP ensures that the total money before and after remains consistent.
🧾 2. Accounting System: Journal Entry Approval
Scenario: An accountant enters a new journal entry, and a supervisor must approve it before it's posted.
-
UDI: The draft journal entry created by the accountant.
-
TPs:
-
submit_entry() (used by the accountant)
-
approve_entry() (used by the supervisor)
-
-
CDIs: The official general ledger.
-
IVP: Monthly reconciliation reports that verify ledger consistency.
🔎 Clark-Wilson Principles Applied:
-
Segregation of duties (entry and approval by different roles).
-
CDIs can only be updated by approved TPs.
-
The system maintains a log of all changes (audit trail).
🏥 3. Healthcare System: Patient Record Updates
Scenario: A nurse enters a patient's vitals, but only a doctor can approve diagnosis notes.
-
UDI: Raw input from nurse or medical device.
-
TPs:
-
record_vitals() (nurse)
-
update_diagnosis() (doctor)
-
-
CDIs: The patient's official medical record.
-
IVP: Scheduled checks by the health information management team.
🔎 Clark-Wilson Principles Applied:
-
TPs enforce that only valid updates go into the medical record.
-
Logs ensure accountability.
-
Separation of access (nurse vs. doctor roles).
🛍️ 4. E-Commerce Platform: Inventory Control
Scenario: A warehouse worker scans items received; a manager updates stock levels.
-
UDI: Raw scan data from barcode input.
-
TPs:
-
verify_shipment() (worker)
-
update_inventory() (manager)
-
-
CDIs: Inventory database.
-
IVP: Daily inventory count validation.
🔎 Clark-Wilson Principles Applied:
-
No direct modification of inventory numbers by workers.
-
Authorized TPs perform updates after validation.
Brewer-Nash Model
The Brewer-Nash Model, also known as the Cinderella Model, is a discretionary access control model designed to prevent conflicts of interest in environments like consulting, law, or finance, where multiple competing clients may be served by the same organization.
🔑 Core Idea
It enforces dynamic access control based on the user's previous access history to ensure they don't access conflicting data.
📌 Key Concepts
-
Conflict of Interest (COI) Classes:
-
Groups of data that, if accessed by the same user, would cause a conflict.
-
Example: "ClientA" and "ClientB" both in the "Banking COI class".
-
-
Objects:
-
Data items, such as documents or databases, that belong to a particular company or client.
-
-
Subjects:
-
Users or processes trying to access data.
-
-
Access Rules:
-
A subject can access any object if:
-
The subject has not accessed any data from a conflicting company, or
-
The data belongs to the same company the subject already accessed.
-
-
🧠 How It Works (Dynamic Rule)
Access is allowed only if the access does not violate any conflict-of-interest policy, based on past access.
It changes dynamically—a subject's access rights can shrink based on what they accessed before.
💼 Example (Consulting Firm)
Scenario: A security consultant works at a firm that serves two competing banks: BankA and BankB.
-
COI Class: Banking
-
Client Data:
-
BankA → BankA_Report.docx
-
BankB → BankB_Audit.pdf
-
Initial Access:
-
The consultant has no access restrictions and can choose either file.
After Accessing BankA_Report.docx:
-
The system locks out access to any BankB files (conflicting interest).
-
The consultant can only work on BankA-related data moving forward.
✅ Key Benefits
-
Prevents insider leaks and unintentional breaches of confidentiality.
-
Enforces ethical walls (a.k.a. Chinese Walls) in firms with competing clients.
-
Highly relevant in financial services, legal firms, and cybersecurity consulting.
⚠️ Limitations
-
Requires accurate classification of conflicts.
-
Can be complex to administer due to dynamically changing permissions.
-
Doesn't focus on confidentiality or integrity directly—only conflict-of-interest control.
Multiple choice questions (MCQs) on Access Control
✅ MCQ 1: Which of the following is a primary goal of access control in cybersecurity?
A. Ensure system uptime
B. Maintain data availability
C. Prevent unauthorized access to resources
D. Enhance data transmission speed
Answer: C. Prevent unauthorized access to resources
Explanation:
Access control is designed to ensure that only authorized users can access specific resources or perform certain actions. While availability is important, access control primarily focuses on authorization and restriction.
✅ MCQ 2: What does the principle of "least privilege" imply in access control?
A. Grant users the highest level of access by default
B. Deny all access until explicitly allowed
C. Give users only the minimum access necessary to perform their tasks
D. Allow anonymous access when needed
Answer: C. Give users only the minimum access necessary to perform their tasks
Explanation:
The principle of least privilege restricts users to the bare minimum access required to do their jobs, reducing risk in case of misuse or compromise.
✅ MCQ 3: In the Bell-LaPadula model, which of the following is true?
A. No write up
B. No read down
C. No read up
D. No write down is allowed
Answer: C. No read up
Explanation:
Bell-LaPadula enforces "no read up" and "no write down" policies to maintain confidentiality. "No read up" prevents subjects from reading data at higher classification levels.
✅ MCQ 4: Which access control model focuses on data integrity rather than confidentiality?
A. Bell-LaPadula
B. Clark-Wilson
C. Biba
D. Brewer-Nash
Answer: C. Biba
Explanation:
The Biba model enforces data integrity, using rules like no read down and no write up to prevent untrusted subjects from corrupting trusted data.
✅ MCQ 5: Role-Based Access Control (RBAC) primarily manages access based on:
A. User identity
B. Network location
C. Assigned roles
D. Security clearance levels
Answer: C. Assigned roles
Explanation:
In RBAC, users are assigned to roles, and permissions are granted to those roles. This simplifies management and supports the principle of least privilege.
✅ MCQ 6: In Discretionary Access Control (DAC), who primarily determines access permissions?
A. The system administrator
B. The object owner
C. The operating system
D. The network firewall
Answer: B. The object owner
Explanation:
In DAC, the owner of the resource decides who can access it and with what permissions, making it more flexible but potentially less secure than mandatory models.
✅ MCQ 7: Which of the following is true about Mandatory Access Control (MAC)?
A. It allows users to set access controls
B. It uses labels and classifications
C. It is the least restrictive model
D. It supports role delegation
Answer: B. It uses labels and classifications
Explanation:
MAC uses security labels (like Top Secret, Secret, etc.) to enforce strict, system-enforced access policies, and users cannot override them.
✅ MCQ 8: Which of the following is a key concept in the Clark-Wilson model?
A. Confidentiality levels
B. Separation of duties and well-formed transactions
C. Discretionary control
D. Multilevel security labels
Answer: B. Separation of duties and well-formed transactions
Explanation:
The Clark-Wilson model focuses on data integrity by enforcing well-formed transactions, separation of duties, and certification of programs that modify data.
✅ MCQ 9: Which access control model is most suitable for dynamic environments like healthcare or finance where roles and policies may change frequently?
A. Mandatory Access Control (MAC)
B. Discretionary Access Control (DAC)
C. Role-Based Access Control (RBAC)
D. Attribute-Based Access Control (ABAC)
Answer: D. Attribute-Based Access Control (ABAC)
Explanation:
ABAC is ideal for dynamic environments because it evaluates access based on attributes (e.g., user department, time of day, data sensitivity) and policy rules, offering fine-grained, flexible control.
✅ MCQ 10: In Biba model, what does the "no write up" property ensure?
A. Data at a higher integrity level is not exposed to lower levels
B. Subjects cannot modify data above their trust level
C. Data is not leaked to unauthorized users
D. Users cannot view information at a higher level
Answer: B. Subjects cannot modify data above their trust level
Explanation:
The "no write up" rule in the Biba model prevents lower-integrity subjects (less trusted users or systems) from contaminating high-integrity data — protecting data from being altered by untrusted sources.
✅ MCQ 11: Which access control model best enforces security based on organizational roles and job functions?
A. Rule-Based Access Control
B. Role-Based Access Control
C. Bell-LaPadula
D. Lattice-Based Access Control
Answer: B. Role-Based Access Control
Explanation:
RBAC is designed to assign permissions based on a user's role in an organization, making it scalable and efficient for managing access across departments and job functions.
✅ MCQ 12: What is the key security risk in Discretionary Access Control (DAC)?
A. Too rigid to apply across departments
B. Users can share access with unauthorized users
C. Central authority restricts flexibility
D. It lacks classification levels
Answer: B. Users can share access with unauthorized users
Explanation:
DAC allows owners to grant access to others, which can result in privilege leakage — a major security risk if users share access too freely or maliciously.
✅ MCQ 13: Which model uses a lattice structure to determine access rights based on multiple levels of sensitivity and classification?
A. Bell-LaPadula
B. RBAC
C. Biba
D. DAC
Answer: A. Bell-LaPadula
Explanation:
The Bell-LaPadula model is based on a lattice structure, where subjects and objects are assigned levels, and access is determined based on dominance relationships — foundational in multilevel security systems.
✅ MCQ 14: Which of the following is not a typical component of Role-Based Access Control?
A. Users
B. Roles
C. Permissions
D. Classifications
Answer: D. Classifications
Explanation:
Classifications are used in MAC-based models like Bell-LaPadula. RBAC is structured around users, roles, and permissions — classifications are not part of its core.
✅ MCQ 15: The Brewer-Nash model is also known as the:
A. Bell-LaPadula extension
B. Chinese Wall Model
C. Multi-Role Model
D. Context-Aware Access Model
Answer: B. Chinese Wall Model
Explanation:
The Brewer-Nash model (Chinese Wall Model) prevents conflict of interest by restricting access to data based on the user's previous actions — often used in consulting and financial firms.
✅ MCQ 16: What is the main idea behind Separation of Duties (SoD) in access control?
A. Assign multiple users to perform the same function
B. Restrict access to high-security documents
C. Split critical tasks among different users to prevent fraud
D. Use dynamic roles in access control
Answer: C. Split critical tasks among different users to prevent fraud
Explanation:
Separation of Duties ensures that no single user has the ability to perform all parts of a sensitive operation (e.g., initiating and approving a payment), which reduces the risk of internal fraud or abuse.
✅ MCQ 17: In an access control system, what is the purpose of an Access Control List (ACL)?
A. To define roles and responsibilities in an organization
B. To filter network traffic based on IP addresses
C. To specify which users or processes are allowed to access an object
D. To encrypt communication between users and systems
Answer: C. To specify which users or processes are allowed to access an object
Explanation:
An Access Control List (ACL) is associated with each resource and explicitly defines which subjects can access it and what operations (read, write, execute) they are permitted to perform.
✅ MCQ 18: Which of the following statements about Mandatory Access Control (MAC) is false?
A. Users can change access permissions on their own files
B. Access decisions are based on security labels
C. It is commonly used in government or military systems
D. Policies are centrally controlled and enforced
Answer: A. Users can change access permissions on their own files
Explanation:
In MAC, only the system (not users) can modify access policies. This is a false statement, as user-defined permission changes are characteristic of DAC, not MAC.
✅ MCQ 19: What is a major benefit of using Attribute-Based Access Control (ABAC) over Role-Based Access Control (RBAC)?
A. ABAC is easier to manage for large organizations
B. ABAC policies are simpler to write
C. ABAC allows access decisions based on a wide range of attributes
D. ABAC assigns permissions only to predefined roles
Answer: C. ABAC allows access decisions based on a wide range of attributes
Explanation:
ABAC evaluates attributes such as user identity, location, time, device, or resource metadata, allowing context-aware, fine-grained access control that RBAC lacks.
✅ MCQ 20: Which of the following best describes the difference between identification, authentication, and authorization?
A. Identification confirms access, authentication validates identity, authorization verifies a password
B. Identification verifies identity, authentication grants permissions, authorization assigns roles
C. Identification says who you are, authentication proves it, authorization defines what you can do
D. All terms mean the same thing in practice
Answer: C. Identification says who you are, authentication proves it, authorization defines what you can do
Explanation:
-
Identification = stating your identity (e.g., username)
-
Authentication = verifying that identity (e.g., password or biometric)
-
Authorization = determining what access you have once authenticated