Modern Software Engineering: Principles & Practices

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts from Modern Software Engineering regarding access control, including models like RBAC, DAC, MAC, the principles behind them, and modern practices in software security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

Access Control is used to __ who can access what resources.

Regulate

2
New cards

In Mandatory Access Control (MAC), the system decides who has __ to resources.

access

3
New cards

In Discretionary Access Control (DAC), users can determine which others can __ their resources.

access

4
New cards

Bell-LaPadula model primarily focuses on __ in access control.

confidentiality

5
New cards

Biba model is designed to ensure __ in access control.

integrity

6
New cards

RBAC stands for __ Based Access Control.

Role

7
New cards

In Role-Based Access Control (RBAC), permissions are assigned to __, which are then assigned to users.

roles

8
New cards

The principle of __ controls who can perform certain actions based on roles in an organization.

Role Hierarchy

9
New cards

Separation of Duty requires that critical operations are divided among __ subjects to prevent security risks.

multiple

10
New cards

Dynamic Separation of Duty (DSD) allows multiple roles assigned to the same user but __ cannot be activated in the same session.

cannot

11
New cards

NGAC is an extension of RBAC that incorporates __ obligations.

administrative

12
New cards

Attribute-Based Access Control (ABAC) grants access based on __ of the subject and object.

attributes

13
New cards

In XACML (eXtensible Access Control Markup Language), access decisions are made based on policy __ and rules.

targets

14
New cards

Zanzibar is a centralized authorization model developed by __.

Google

15
New cards

Cedar is an open-source policy language created by __.

Amazon

16
New cards

OWASP identifies Broken Access Control as a top security __.

risk