1/4
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Mandatory Access Control (MAC)
Assign rights to users based off of labels
Confidential, Secret, top secret
Discretionary Access Control (DAC)
Owner chooses who has access to data
Weak security
Role-based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Combine & Evaluate multi parameters
IP, Time of Day, Desired action, relationship to data, etc.
Time of day restrictions