Access Control Concepts in Cybersecurity

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key vocabulary concepts related to access control and cybersecurity principles, as discussed in the lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Access Control

The methods used to restrict and manage access to organizational assets such as buildings, data, and systems.

2
New cards

Subjects

Any entity that requests access to assets, which can include users, clients, processes, or programs.

3
New cards

Objects

Entities that a subject attempts to access, such as files, devices, or systems.

4
New cards

Access Rule

An instruction that determines whether a subject can access an object, typically compared against an access control list.

5
New cards

Defense in Depth

A security strategy that uses multiple layers of protection to prevent cyberattacks and mitigate risks.

6
New cards

Principle of Least Privilege

A security concept where individuals are granted only the access necessary for their role to minimize the risk of unauthorized access.

7
New cards

Role-Based Access Control (RBAC)

A method of regulating access to computer or network resources based on the individual user's role within an organization.

8
New cards

Privileged Access Management (PAM)

A security solution designed to safeguard and control access to sensitive resources and data by ensuring users have only the permissions they need.

9
New cards

Multi-Factor Authentication (MFA)

A security enhancement that requires two or more verification methods to gain access to a resource.

10
New cards

Physical Access Control

Tangible methods or mechanisms used to restrict access to physical locations or assets.

11
New cards

Logical Access Control

Electronic methods that restrict access to computer systems and data, often through passwords or biometric systems.

12
New cards

Monitoring and Auditing

The practice of systematically observing and recording user activity to ensure compliance with security policies.

13
New cards

Alarm Systems

Devices designed to alert personnel of unauthorized access attempts, often utilizing sensors or manual activation.

14
New cards

Log Anomalies

Irregularities in log data that may indicate security threats or breaches.