Access Control Concepts in Cybersecurity

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key vocabulary concepts related to access control and cybersecurity principles, as discussed in the lecture.

Last updated 4:30 PM on 11/8/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

23 Terms

1
New cards

Access Control

The methods used to restrict and manage access to organizational assets such as buildings, data, and systems.

2
New cards

Subjects

Any entity that requests access to assets, which can include users, clients, processes, or programs.

3
New cards

Objects

Entities that a subject attempts to access, such as files, devices, or systems.

4
New cards

Access Rule

An instruction that determines whether a subject can access an object, typically compared against an access control list.

5
New cards

Defense in Depth

A security strategy that uses multiple layers of protection to prevent cyberattacks and mitigate risks.

6
New cards

Principle of Least Privilege

A security concept where individuals are granted only the access necessary for their role to minimize the risk of unauthorized access.

7
New cards

Role-Based Access Control (RBAC)

A method of regulating access to computer or network resources based on the individual user's role within an organization.

8
New cards

Privileged Access Management (PAM)

A security solution designed to safeguard and control access to sensitive resources and data by ensuring users have only the permissions they need.

9
New cards

Multi-Factor Authentication (MFA)

A security enhancement that requires two or more verification methods to gain access to a resource.

10
New cards

Physical Access Control

Tangible methods or mechanisms used to restrict access to physical locations or assets.

11
New cards

Logical Access Control

Electronic methods that restrict access to computer systems and data, often through passwords or biometric systems.

12
New cards

Monitoring and Auditing

The practice of systematically observing and recording user activity to ensure compliance with security policies.

13
New cards

Alarm Systems

Devices designed to alert personnel of unauthorized access attempts, often utilizing sensors or manual activation.

14
New cards

Log Anomalies

Irregularities in log data that may indicate security threats or breaches.

15
New cards

Discretionary Access Control DAC

Access control where the object's owner dictates who has access and what rights they possess. NIST SP 800-192

16
New cards

Firewall

A device that enforces administrative Security Policies by filtering incoming traffic based on a set of rules.

17
New cards

Mandatory Access Control

Access control that requires the system itself to manage access controls in accordance with the organizations security policies.

18
New cards

Mantrap

An entrance that requires people to pass through two doors with only one door opened at a time.

19
New cards

Privileged Account

An information system account with approved authorizations of a privileged user.

20
New cards

Rule

An instruction developed to allow or deny access to a system by comparing the validated identity of the subject to an access control list

21
New cards

Technical Controls

The security controls for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software or firmware components of the system.

22
New cards

User Provisioning

The process of crating, maintaining and deactivating user identities on a system.

23
New cards

Call Trees

A hierarchical communication structure used in incident response to rapidly notify a large number of designated personnel about a security event or an access control incident.