Week 10-11 Flashcards
(21 cards)
is a security technique that regulates who or what can view or use resources.
Access Control
4 Core components of Access control
Identification
Authentication
Authorization
Accountability
Declaring an identity, such as with a username or ID card.
Identification
Proving the declared identity, for example, with a password or biometrics.
Authentication
Determining what actions a user is permitted to perform.
Authorization
Tracking user actions for auditing purposes.
Accountability
define how access rights are assigned and enforced.
Access Control Models
Access control models 4 main types:
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
A permission system where the data owner decides who can access resources and what they can do.
Discretionary Access Control (DAC)
A strict system where access is based on security policies and classification levels, which users cannot change.
Mandatory Access Control (MAC)
A method where permissions are assigned based on a user’s role within an organization. Permissions are assigned to roles, and users are then assigned to those roles.
Role-Based Access Control (RBAC)
is a flexible and dynamic access control model where access decisions are made based on multiple attributes
Attribute-Based Access Control (ABAC)
the tools and components that enforce the rules and models (like DAC, MAC, RBAC, ABAC) we use to manage who can access what in a system.
Access Control Mechanisms
is attached to a resource (like a file or folder) and lists which users or groups are allowed to do specific actions (read, write, execute, delete).
Access Control Lists
is tied to a user or process and shows what resources they are allowed to access and with what
permissions.
Capability List
is the part of a system that physically enforces access control. It intercepts requests and either blocks or
forwards them for a decision.
Policy Enforcement Point (PEP)
is the component that makes the decision based on the policies: “Should access be allowed or not?”
It works behind the scenes, often in coordination with the PEP.
Policy Decision Point (PDP)
is the science of protecting information by converting it into an unreadable format, so that only
authorized parties can understand it when it’s decrypted.
Cryptography
Principles of Access Control