Identify Proofing + Access Control

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

Identify proofing

confirms a person claiming a particular identity is actually who they say they are

2
New cards

Non-discretionary Access Control

Enables the enforcement of system-wide restrictions that override object-specific access control. RBAC is considered non-discretionary

3
New cards

Discretionary Access Control (DAC)

A key characteristic of the Discretionary Access Control (DAC) model is that every object has an owner, and the owner can grant or deny access to any other subject. Example: New Technology File System (NTFS) on Windows

4
New cards

Role Based Access Control (RBAC)

User accounts are placed in roles or groups. Admins assign access through the roles and groups rather than to users directly

5
New cards

Rule-based access control (RBAC)

A key characteristic is that it applies global rules that apply to all subjects. Rules within this model are sometimes referred to as restrictions or filters

6
New cards

Attribute-Based Access Control

Access is restricted based on an attribute on the account, such as department, location, or functional designation

7
New cards

Mandatory Access Control (MAC)

a model in which every object and every subject has one or more labels. These labels are predefined, and the system determines access based on assigned labels.