Week 10-11 Flashcards

(21 cards)

1
Q

is a security technique that regulates who or what can view or use resources.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 Core components of Access control

A

Identification
Authentication
Authorization
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Declaring an identity, such as with a username or ID card.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Proving the declared identity, for example, with a password or biometrics.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Determining what actions a user is permitted to perform.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tracking user actions for auditing purposes.

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

define how access rights are assigned and enforced.

A

Access Control Models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control models 4 main types:

A

Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A permission system where the data owner decides who can access resources and what they can do.

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A strict system where access is based on security policies and classification levels, which users cannot change.

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A method where permissions are assigned based on a user’s role within an organization. Permissions are assigned to roles, and users are then assigned to those roles.

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a flexible and dynamic access control model where access decisions are made based on multiple attributes

A

Attribute-Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the tools and components that enforce the rules and models (like DAC, MAC, RBAC, ABAC) we use to manage who can access what in a system.

A

Access Control Mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is attached to a resource (like a file or folder) and lists which users or groups are allowed to do specific actions (read, write, execute, delete).

A

Access Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is tied to a user or process and shows what resources they are allowed to access and with what
permissions.

A

Capability List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is the part of a system that physically enforces access control. It intercepts requests and either blocks or
forwards them for a decision.

A

Policy Enforcement Point (PEP)

17
Q

is the component that makes the decision based on the policies: “Should access be allowed or not?”
It works behind the scenes, often in coordination with the PEP.

A

Policy Decision Point (PDP)

18
Q

is the science of protecting information by converting it into an unreadable format, so that only
authorized parties can understand it when it’s decrypted.

19
Q

Principles of Access Control