ch2 Flashcards

(2 cards)

1
Q

what is identity proofing?

A

“Identity proofing is the process of rigorously verifying that a user is who they claim to be during the initial enrollment in an application or system. This process may involve verifying official documents, using biometric data, or answering security questions to establish the user’s identity. Identity proofing is crucial in identity management because it helps prevent identity fraud, ensuring that only legitimate users can access sensitive systems or data. By thoroughly establishing trust at the outset, organizations can reduce the risk of unauthorized access and protect their resources from potential security breaches.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the attribute-based access control (ABAC) model differ from the discretionary access control (DAC) model?

A

“The Discretionary Access Control (DAC) model allows resource owners to set access rights and permissions for their resources, giving them full control over who can access or modify those resources. In contrast, the Attribute-Based Access Control (ABAC) model is a more flexible and sophisticated scheme that defines access rules based on a combination of attributes, such as user roles, resource characteristics, and contextual factors like time and location. This flexibility allows ABAC to enforce more granular and context-specific access control policies.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly