1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Identify proofing
confirms a person claiming a particular identity is actually who they say they are
Non-discretionary Access Control
Enables the enforcement of system-wide restrictions that override object-specific access control. RBAC is considered non-discretionary
Discretionary Access Control (DAC)
A key characteristic of the Discretionary Access Control (DAC) model is that every object has an owner, and the owner can grant or deny access to any other subject. Example: New Technology File System (NTFS) on Windows
Role Based Access Control (RBAC)
User accounts are placed in roles or groups. Admins assign access through the roles and groups rather than to users directly
Rule-based access control (RBAC)
A key characteristic is that it applies global rules that apply to all subjects. Rules within this model are sometimes referred to as restrictions or filters
Attribute-Based Access Control
Access is restricted based on an attribute on the account, such as department, location, or functional designation
Mandatory Access Control (MAC)
a model in which every object and every subject has one or more labels. These labels are predefined, and the system determines access based on assigned labels.