Sec+ 11-12 Identify Access Control

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Access Control

The process of determining who or what can access or use resources within a system.

2
New cards

Access Control Models

Frameworks used to define and implement access control policies; includes Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Rule-Based Access Control.

3
New cards

Identification

The act of presenting credentials or an identifier to a system.

4
New cards

Authentication

The process of verifying the identity of a user or system.

5
New cards

Authorization

The process of granting or denying specific permissions to a user or system.

6
New cards

Discretionary Access Control (DAC)

An access control model where the owner of the resource decides who can access it.

7
New cards

Mandatory Access Control (MAC)

A strict access control model that relies on security labels and levels to regulate access.

8
New cards

Role-Based Access Control (RBAC)

An access control model where permissions are assigned to specific roles rather than individuals.

9
New cards

Physical Access Control

Methods used to restrict physical access to facilities, resources, or information systems.

10
New cards

Logical Access Control

Access control policies applied via the system or software to manage user access to digital resources.

11
New cards

Single Sign-On (SSO)

An authentication process that allows a user to access multiple applications with one set of login credentials.

12
New cards

Authentication Credentials

The information used to verify a person's identity, including passwords, tokens, and biometric data.

13
New cards

Password Expiration

A policy that requires users to change their password after a specific period.

14
New cards

Access Control Lists (ACL)

A set of rules that specify which users or system processes have access to objects and what operations they can perform.

15
New cards

Multi-Factor Authentication (MFA)

An authentication method that requires two or more verification factors to gain access to a resource.

16
New cards

Behavioral Biometrics

Authentication based on patterns of user behavior, such as typing speed and mouse movements.

17
New cards

Geolocation

Authentication based on the physical location of a user or device.

18
New cards

OAuth

An open standard for access delegation used by websites to grant third-party applications limited access to user accounts without exposing passwords.

19
New cards

Access Control is the process of determining who or what can _______ or use resources within a system.

Access Control

20
New cards

_______ is the act of presenting credentials or an identifier to a system.

Identification

21
New cards

The process of verifying the identity of a user or system is known as _______.

Authentication

22
New cards

The process of granting or denying specific permissions to a user or system is called _______.

Authorization

23
New cards

In Discretionary Access Control (DAC), the _______ of the resource decides who can access it.

owner

24
New cards

Mandatory Access Control (MAC) relies on security _______ and levels to regulate access.

labels

25
New cards

_______ assigns permissions to specific roles rather than individuals in an organization.

Role-Based Access Control (RBAC)

26
New cards

Methods used to restrict physical access to facilities or resources are known as _______ Access Control.

Physical

27
New cards

_______ Access Control refers to policies applied via the system or software to manage user access to digital resources.

Logical

28
New cards

Single Sign-On (SSO) allows a user to access multiple applications with one set of _______ credentials.

login

29
New cards

What is the primary purpose of Access Control?

To protect resources by determining who can access them.

30
New cards

What does DAC stand for?

Discretionary Access Control.

31
New cards

In MAC, who enforces the access policies?

A central authority, based on security labels.

32
New cards

What does RBAC stand for?

Role-Based Access Control.

33
New cards

What is an example of Logical Access Control?

Use of passwords and access control lists.

34
New cards

What is the benefit of Multi-Factor Authentication (MFA)?

Increases security by requiring multiple verification methods.

35
New cards

What role do Authentication Credentials play?

They verify a person’s identity.

36
New cards

What is the significance of Single Sign-On (SSO)?

It simplifies user access by using one set of credentials.

37
New cards

What is an Access Control List (ACL)?

A set of rules defining user access to resources.

38
New cards

How does Behavioral Biometrics enhance security?

By analyzing user behavior patterns for authentication.