Objects in Access Control
Introduction
In Access Control, an object is any resource or entity that needs protection from unauthorized access. While subjects request access, objects are what get accessed.
π Object = What is being accessed
Objects are central to enforcing security because they contain data, services, or system resources that must be protected.
Meaning of Object
An object is a passive entity that:
- Stores or contains information
- Is acted upon by subjects
- Requires controlled access
π Objects do not initiate actionsβthey are accessed by subjects.
Examples of Objects
- Files and folders
- Databases
- Programs / applications
- Printers and devices
- Network resources
- Memory and system processes
Types of Objects in Access Control
1. Data Objects
Description
Objects that store information.
Examples
- Text files
- Databases
- Spreadsheets
π Most sensitive objects in a system.
2. System Objects
Description
Core components of the operating system.
Examples
- Memory
- CPU
- System files
3. Application Objects
Description
Software-related resources.
Examples
- Programs
- Executable files
- Application modules
4. Network Objects
Description
Resources available over a network.
Examples
- Shared folders
- Web servers
- APIs
5. Physical Objects
Description
Hardware resources that require access control.
Examples
- Printers
- Hard disks
- USB devices
Objects vs Subjects
| Feature | Object | Subject |
|---|---|---|
| Nature | Passive | Active |
| Role | Resource | Requests access |
| Example | File, Database | User, Process |
π Subjects act on objects.
Access Rights on Objects
Objects are protected by defining access rights:
- Read (R) β View content
- Write (W) β Modify content
- Execute (X) β Run program
- Delete (D) β Remove object
Object Attributes
Each object has attributes used in access control:
- Owner
- Access permissions
- Security classification (Confidential, Public)
- Creation/modification time
π Used in Access Control Lists (ACLs) and security policies.
Protection of Objects
Objects are protected using:
- Access Control Lists (ACL)
- Encryption
- Authentication mechanisms
- Firewalls and security policies
Objects in Access Control Models
1. DAC (Discretionary Access Control)
- Object owner decides access permissions
2. MAC (Mandatory Access Control)
- Objects have security labels (e.g., Confidential)
3. RBAC (Role-Based Access Control)
- Access to objects based on user roles
Objects and Security Principles
- Least Privilege β Minimum access to objects
- Need-to-Know β Access only required objects
- Accountability β Object access is logged
Objects and CIA Triad
- Confidentiality β Protect objects from unauthorized access
- Integrity β Prevent unauthorized modification
- Availability β Ensure objects are accessible when needed
Real-Life Examples
Example 1: College System
- Object β Student result database
- Access β Read-only for students
Example 2: Banking System
- Object β Customer account data
- Access β Read/Write for authorized staff
Objects in Cyber Law (India)
Under IT Act, 2000:
- Unauthorized access to objects β Section 43
- Data tampering β Section 65
π Objects (data/resources) are legally protected assets.
Advantages of Object Protection
- Prevents data breaches
- Ensures data accuracy
- Enhances system security
- Supports compliance with laws
Conclusion
Objects are the resources that need protection in any system. Proper identification, classification, and control of objects ensure that only authorized subjects can access them. Effective object management is essential for maintaining confidentiality, integrity, and availability in information systems.
π MCA Exam Tip
For 10β15 marks:
- Define object
- Explain types (data, system, network, etc.)
- Add Subject vs Object table
- Include access rights and examples
