Access Control: Setting Up Subject-Object Permissions

Access Control: Setting Up Subject-Object Permissions

Prev Question Next Question

Question

To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

Controlling access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up access rules.

These rules can be classified into three access control models: Mandatory, Discretionary, and Non-Discretionary.

An access matrix is one of the means used to implement access control.

Source: KRUTZ, Ronald L.

& VINES, Russel.

D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 33.

To control access by a subject to an object, a security mechanism is implemented known as access control. Access control can be defined as the process of restricting access to resources, information, or services.

Access control is a fundamental principle of security that ensures that only authorized subjects can access objects. There are several types of access controls, including mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC).

In order to implement access control, an access control model is used. The access control model consists of two components: a subject and an object. The subject is an active entity, such as an individual or a process, that is requesting access to an object, which is a passive entity, such as a file or a database.

Access control involves setting up a system that can determine which subjects can access which objects. The system uses access rules to determine which subjects are allowed to access which objects. The access rules are typically based on the identity of the subject, the sensitivity of the object, and the context in which the access request is made.

One way to represent access control is through an access matrix. The access matrix is a two-dimensional table that shows the subjects and objects and the type of access that each subject has to each object. The access matrix is an important tool for understanding access control, as it can help to identify which subjects have access to which objects and which types of access are permitted.

Identification controls are another important aspect of access control. Identification controls are used to ensure that the subject is who they claim to be. This is typically done through the use of passwords, smart cards, or biometric authentication.

Access terminals are physical devices that are used to control access to a physical space, such as a building or a room. Access terminals can be used to restrict access to a specific area, such as a server room or a secure data center.

In conclusion, to control access by a subject to an object involves setting up access rules, implementing an access control model, and using identification controls to ensure that the subject is authorized to access the object. An access matrix is an important tool for understanding access control, and access terminals can be used to control access to physical spaces.