Access control models and authentication
Access control models define the rules by which subjects (users, processes) access objects (files, systems). Mandatory Access Control (MAC) uses security labels assigned by a central authority. Users cannot grant access to others beyond their own clearance level. MAC is used in government and military environments. Discretionary Access Control (DAC) lets the owner of a resource decide who else can access it. File system permissions on most operating systems are DAC. Role-Based Access Control (RBAC) assigns permissions to roles rather than individuals, and users receive access by being assigned to roles. Attribute-Based Access Control (ABAC) makes decisions based on multiple attributes: user attributes, resource attributes, and environmental conditions like time of day or location.
Authentication factors are categorized by what they use to prove identity: something you know (password, PIN), something you have (smart card, hardware token, smartphone), and something you are (fingerprint, iris scan, voice). Multi-factor authentication combines two or more different factor types. Combining a password with a PIN uses two things you know, which is not MFA. Combining a password with a phone-based OTP is MFA because it uses two different factor types.
Federation and Single Sign-On (SSO) extend authentication across organizational boundaries. SAML (Security Assertion Markup Language) is an XML-based standard used for web application SSO, particularly in enterprise environments. OAuth 2.0 is an authorization framework (not authentication) that allows third-party applications to access resources on behalf of a user without sharing credentials. OpenID Connect (OIDC) adds an identity layer on top of OAuth 2.0, enabling authentication. Kerberos is a ticket-based authentication protocol used in Windows Active Directory environments.
Cryptography: algorithms, key management, and PKI
Symmetric cryptography uses one key for both encryption and decryption. AES (Advanced Encryption Standard) is the current standard, used in 128, 192, and 256-bit key lengths. DES (56-bit) and 3DES are deprecated and should not be used in new systems. Stream ciphers encrypt one bit or byte at a time (RC4, now deprecated). Block ciphers encrypt fixed-size blocks (AES). Symmetric encryption is fast and suitable for bulk data encryption, but requires a secure mechanism to share the key with the other party.
Asymmetric cryptography uses a public key (shared freely) and a private key (kept secret). Data encrypted with the public key can only be decrypted with the corresponding private key. Data signed with the private key can be verified by anyone with the public key. RSA and ECC (Elliptic Curve Cryptography) are the dominant asymmetric algorithms. ECC achieves the same security strength as RSA with much shorter key lengths, making it preferred for resource-constrained devices. Diffie-Hellman enables two parties to establish a shared secret over an untrusted channel without previously sharing a key.
Key management is where cryptography implementations most often fail in practice. A PKI (Public Key Infrastructure) provides the framework for issuing, managing, and revoking digital certificates. A Certificate Authority (CA) signs certificates to attest that a public key belongs to a specific entity. Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) enable checking whether a certificate has been revoked before it expires. Key escrow stores copies of encryption keys with a trusted third party, enabling recovery if the original key is lost.
How to choose the correct answer
MAC: central authority assigns labels, no discretion. DAC: owner controls access. RBAC: permissions via roles. ABAC: multiple attributes drive decisions.
MFA: two different factor types (know, have, are). Two passwords = not MFA. Password + OTP = MFA.
SAML: enterprise SSO using XML assertions. OAuth: authorization (not authentication). OIDC: authentication on top of OAuth.
Symmetric (AES): same key, fast, key distribution problem. Asymmetric (RSA, ECC): key pair, slower, solves key distribution.
Sign with private key (proves identity, non-repudiation). Encrypt with public key (only private key holder can decrypt).
PKI: CA issues certificates. CRL/OCSP: check revocation. Certificate = trusted binding of public key to identity.
ECC: same security as RSA with shorter keys. Preferred for mobile and IoT due to lower computation requirements.