Skip to content
Home Β» Objects

Objects

Objects in Access Control

Introduction

In Access Control, an object is any resource or entity that needs protection from unauthorized access. While subjects request access, objects are what get accessed.

πŸ‘‰ Object = What is being accessed

Objects are central to enforcing security because they contain data, services, or system resources that must be protected.


Meaning of Object

An object is a passive entity that:

  • Stores or contains information
  • Is acted upon by subjects
  • Requires controlled access

πŸ“Œ Objects do not initiate actionsβ€”they are accessed by subjects.


Examples of Objects

  • Files and folders
  • Databases
  • Programs / applications
  • Printers and devices
  • Network resources
  • Memory and system processes

Types of Objects in Access Control


1. Data Objects

Description

Objects that store information.

Examples

  • Text files
  • Databases
  • Spreadsheets

πŸ“Œ Most sensitive objects in a system.


2. System Objects

Description

Core components of the operating system.

Examples

  • Memory
  • CPU
  • System files

3. Application Objects

Description

Software-related resources.

Examples

  • Programs
  • Executable files
  • Application modules

4. Network Objects

Description

Resources available over a network.

Examples

  • Shared folders
  • Web servers
  • APIs

5. Physical Objects

Description

Hardware resources that require access control.

Examples

  • Printers
  • Hard disks
  • USB devices

Objects vs Subjects

FeatureObjectSubject
NaturePassiveActive
RoleResourceRequests access
ExampleFile, DatabaseUser, Process

πŸ“Œ Subjects act on objects.


Access Rights on Objects

Objects are protected by defining access rights:

  • Read (R) β†’ View content
  • Write (W) β†’ Modify content
  • Execute (X) β†’ Run program
  • Delete (D) β†’ Remove object

Object Attributes

Each object has attributes used in access control:

  • Owner
  • Access permissions
  • Security classification (Confidential, Public)
  • Creation/modification time

πŸ“Œ Used in Access Control Lists (ACLs) and security policies.


Protection of Objects

Objects are protected using:

  • Access Control Lists (ACL)
  • Encryption
  • Authentication mechanisms
  • Firewalls and security policies

Objects in Access Control Models

1. DAC (Discretionary Access Control)

  • Object owner decides access permissions

2. MAC (Mandatory Access Control)

  • Objects have security labels (e.g., Confidential)

3. RBAC (Role-Based Access Control)

  • Access to objects based on user roles

Objects and Security Principles

  • Least Privilege β†’ Minimum access to objects
  • Need-to-Know β†’ Access only required objects
  • Accountability β†’ Object access is logged

Objects and CIA Triad

  • Confidentiality β†’ Protect objects from unauthorized access
  • Integrity β†’ Prevent unauthorized modification
  • Availability β†’ Ensure objects are accessible when needed

Real-Life Examples

Example 1: College System

  • Object β†’ Student result database
  • Access β†’ Read-only for students

Example 2: Banking System

  • Object β†’ Customer account data
  • Access β†’ Read/Write for authorized staff

Objects in Cyber Law (India)

Under IT Act, 2000:

  • Unauthorized access to objects β†’ Section 43
  • Data tampering β†’ Section 65

πŸ“Œ Objects (data/resources) are legally protected assets.


Advantages of Object Protection

  • Prevents data breaches
  • Ensures data accuracy
  • Enhances system security
  • Supports compliance with laws

Conclusion

Objects are the resources that need protection in any system. Proper identification, classification, and control of objects ensure that only authorized subjects can access them. Effective object management is essential for maintaining confidentiality, integrity, and availability in information systems.


πŸ“˜ MCA Exam Tip

For 10–15 marks:

  • Define object
  • Explain types (data, system, network, etc.)
  • Add Subject vs Object table
  • Include access rights and examples