Access Control Schemes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

In a mandatory access control (MAC) implementation

users do not have the ability to grant access to files or otherwise change the security policies that are set centrally

2
New cards

In a discretionary access control (DAC) implementation

the owners of a file (or directory) can set permissions that apply to the owner, the group, or the world, and they can choose to allow the file to be read, modified, or executed

3
New cards

Role-based access control (RBAC)

systems rely on roles that are then matched with privileges that are assigned to those roles. ____ systems boil down to three primary rules:

  • Role assignment, which states that subjects can use only permissions that match a role they have been assigned

  • Role authorization, which states that the subject’s active role must be authorized for the subject

  • Permission authorization, which states that subjects can use only permissions that their active role is allowed to use

4
New cards

Rule-based access control

is applied using a set of rules, or access control lists (ACLs), that apply to various objects or resources

5
New cards

Attribute-based access control (ABAC)

relies on policies that are driven by attributes of the users

6
New cards

Time-of-day restrictions

which limit when activities can occur

7
New cards

Least privilege

the concept that accounts and users should only be given the minimum set of permissions and capabilities necessary to perform their role or job function