Week 10-11 Flashcards

(18 cards)

1
Q

is a security technique that regulates who or
what can view or use resources.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 Core components

A

Identification
Authentication
Authorization
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Declaring identity (e.g., username, ID card)

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Proving identity (e.g., password, biometrics)

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Determining what the user is allowed to do

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tracking user actions for auditing

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

define how access rights are assigned and enforced.

A

Access models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control models 4 main types:

A

Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a permission system where the owner of the data (usually the person who created it) decides who can access it and what they can do with it (read, write, delete, etc.).

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a strict access control system where access to data is based on security policies and classification levels, not user preferences. The system enforces the rules, and users cannot change them.

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a method of managing access where permissions are assigned based on a user’s role in an organization.
Instead of assigning permissions to each user individually, you assign them to roles, and then assign users to those roles.

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a flexible and dynamic access control model where access decisions are made
based on multiple attributes

A

Attribute-Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the tools and components that enforce the rules and models (like DAC, MAC, RBAC, ABAC) we use to manage who can access what in a system.

A

Access Control Mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is attached to a resource (like a file or folder) and lists which users or groups are allowed to do specific actions (read, write, execute, delete).

A

Access Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is tied to a user or process and shows what resources they are allowed to access and with what
permissions.

A

Capability List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is the part of a system that physically enforces access control. It intercepts requests and either blocks or
forwards them for a decision.

A

Policy Enforcement Point (PEP)

17
Q

is the component that makes the decision based on the policies: “Should access be allowed or not?”
It works behind the scenes, often in coordination with the PEP.

A

Policy Decision Point (PDP)

18
Q

is the science of protecting information by converting it into an unreadable format, so that only
authorized parties can understand it when it’s decrypted.