GCGA Ch. 2 Comparing Access Control Schemes (ST) Flashcards

(6 cards)

1
Q

Role-BAC

A

role-based access control - uses roles to grant access by placing users into roles based on their assigned jobs, functions, or tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Group-based privileges

A

a form of role-BAC. Administrators create groups, add users to the groups, and then assign permissions to the groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rule-BAC

A

rule-based access control - based on a set of approved instructions, such as ACL rules in a firewall. Some rule-BAC implementations use rules that trigger in response to an event, such as modifying ACLs after detecting an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC

A

Discretionary access control - every object has an owner. The owner has explicit access and establishes access for any other user. Microsoft NTFS uses the DAC scheme, with every object having a discretionary access control list (DACL). The DACL identifies who has access and what access they are granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC

A

Mandatory access control - uses security or sensitivity labels to identify objects (what you’ll secure) and subjects (users). It is often used when access needs to be restricted based on a need to know. The administrator establishes access based on predefined security labels. These labels are often defined with a lattice to specify the upper and lower security boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ABAC

A

Attribute-based access control - evaluates attributes and grants access based on these attributes’ values. It is used in many software-defined networks (SDNs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly