0
0
Operating Systemsknowledge~5 mins

Access control matrix in Operating Systems - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is an Access Control Matrix?
An Access Control Matrix is a table that shows which users (subjects) have what kind of access (permissions) to which resources (objects) in a system.
Click to reveal answer
beginner
What are the main components of an Access Control Matrix?
The main components are subjects (like users or processes), objects (like files or devices), and the rights or permissions (like read, write, execute) that subjects have on objects.
Click to reveal answer
beginner
How does an Access Control Matrix help in security?
It helps by clearly defining who can do what with each resource, preventing unauthorized access and protecting system resources.
Click to reveal answer
intermediate
What is a limitation of using a full Access Control Matrix in real systems?
The matrix can become very large and sparse, making it inefficient to store and manage directly for systems with many users and resources.
Click to reveal answer
intermediate
Name two common ways to implement Access Control Matrices in operating systems.
Access Control Lists (ACLs), which list permissions per object, and Capability Lists, which list permissions per subject.
Click to reveal answer
What does an Access Control Matrix primarily represent?
AUser passwords
BNetwork connections between computers
CFile storage locations
DPermissions of subjects on objects
In an Access Control Matrix, what are 'subjects'?
AResources like files or devices
BUsers or processes that access resources
CSecurity policies
DEncryption keys
Which of the following is NOT a typical permission in an Access Control Matrix?
ADelete user account
BWrite
CRead
DExecute
Why is a full Access Control Matrix often not stored directly in systems?
AIt is illegal to store
BIt is too small to be useful
CIt is too large and mostly empty
DIt requires special hardware
Which method lists permissions per object rather than per subject?
AAccess Control List (ACL)
BCapability List
CEncryption
DFirewall
Explain what an Access Control Matrix is and why it is important in operating systems.
Think about how a system controls who can do what with files or devices.
You got /4 concepts.
    Describe two common ways to implement access control based on the Access Control Matrix concept.
    One focuses on objects, the other on subjects.
    You got /3 concepts.