domain 1: Access Control Flashcards
(36 cards)
access control models
mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC)
CIA Triad
confidentiality, integrity, and availability
confidentiality
seeks prevent the unauthorized disclosure of information: it keeps data secret.
integrity
seeks to prevent unauthorized modification of information.
availability
ensures that information is available when needed.
identification
.
proving an identity claim is called:
authentication
describes the actions you can perform on a system once you have identified and authenticated
Authorization.
typically accomplished by logging and analyzing audit data
accountability
active entity on a data system
subject
passive data within the system
object
discretionary access control
.
mandatory access control
.
role-based access control
.
false reject rate
.
false accept rate
.
crossover error rate
.
seeks to protect information against unauthorized modification
Data integrity
seeks to protect the system such as Windows 2012 server operating system from unauthorized modification
System integrity
The CIA Triad may also be described by its opposite
disclosure alteration and destruction
AAA
authentication authorization and accountability
means a user cannot deny having performed the transaction
non-repudiation
means users should be granted the minimum amount of access required to do their jobs but no more
least privilege
more granular than least privilege: the user must need to know that specific piece of information before accessing it
need to know