Module 02: Identification, Authentication, and Authorization Flashcards

1
Q

Defined as a user or a process that that attempt to access the objects. The ______ are those entities that perform certain actions on the system.

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

An explicit resource on which an access restriction is imposed. The access controls implemented on this further control the actions performed by the user.

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Monitors the restrictions imposed on the basis of certain access control rules. it implements a set of rules on the ability of the subject to perform certain actions on the object.

A

Reference Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An action performed by a subject on a object. A user trying to delete a file is an example.

A

Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Determines the usage and access policies for the users. A user can access a resource only if they have access rights to that resource. This is applied in the case of data that has been marked as highly confidential.

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Also can be termed as need-to-know access model where the decision can be taken by an owner to provide or any access to specific user or a group of users. Determines the access control taken by any possessor of an object in order to decide the access control of a subject on that object.

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The access permissions are available based on the access policies determined by the system. The access permissions are beyond the user control which implies that users cannot amend the access policies created by the system.

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Permissions are assigned to a user role dynamically based on a set of rules defined by the administrator

A

Rule-Based access Control (RB-RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly