Windows security features, Password policy guidelines, File system permissions, User account types, Security principles

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

WK03 C229 Cloud Computing Essentials

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Access Control Models

Frameworks and methods used to determine and enforce who can access what resources and perform which actions.

2
New cards

Active Directory (AD)

A directory service developed by Microsoft for Windows domain networks. It is used to manage user accounts, computers, and other network resources, and to enforce security policies.

3
New cards

Password Policy

A set of rules that defines the requirements for creating and using passwords on a computer system or network, often including minimum length, complexity requirements, and expiration rules.

4
New cards

Password Complexity

Requirements for a password to include a combination of character types (uppercase letters, lowercase letters, numbers, special characters) and to not contain easily guessed information like parts of the username.

5
New cards

Default User Accounts

Predefined user accounts created automatically during the installation of an operating system, often with specific levels of privilege.

6
New cards

Guest Account

A default user account often created by operating systems to allow temporary or limited access to the system for users without a standard account.

7
New cards

Windows File Permissions (NTFS Permissions)

Permissions applied to files and folders on partitions formatted with the NTFS file system, controlling access for local and network users and groups.

8
New cards

Network Share Permissions (Share Permissions)

Permissions applied to folders shared over a network, controlling access for users connecting to the shared resource.

9
New cards

Effective Permissions

The actual permissions a user has on a resource, calculated by combining permissions granted through their user account and any groups they belong to, considering permission precedence rules.

10
New cards

Principle of Least Privilege (POLP)

A security principle that dictates that users, accounts, and processes should be granted only the minimum level of access or permissions necessary to perform their intended functions.

11
New cards

Separation of Duties (SOD)

A security principle and internal control mechanism that involves dividing tasks or responsibilities among multiple individuals to prevent a single person from having complete control over a critical process, reducing the risk of fraud, error, or abuse. Also known as segregation of duties.

12
New cards

Privilege Escalation

The act of gaining unauthorized elevated access or permissions on a computer system or network, typically moving from a standard user account to an administrator or system-level account.

13
New cards

NTFS (New Technology File System)

The primary file system used by recent versions of Microsoft Windows, offering features like security permissions, encryption, and compression.

14
New cards

DAC (Discretionary Access Control)

An access control model where the owner of a resource can determine who has access to it and what permissions they have.

15
New cards

Inheritance (Permissions)

The process by which permissions assigned to a parent folder are automatically applied to its child folders and files.

16
New cards

Explicit Permissions

Permissions that are directly assigned to a user or group on a specific object (file or folder), not inherited from a parent.

17
New cards
18
New cards

Inherited Permissions (Implicit Permissions)

Permissions that an object receives from its parent folder.

19
New cards

Precedence (Permissions)

The order in which conflicting permissions are evaluated to determine a user's effective access to a resource.

20
New cards

Cumulative Permissions (Additive Property)

The rule that if a user is a member of multiple groups with different permissions on the same object, their effective permissions are the sum of all the allowed permissions from those groups (unless a Deny permission is present).

21
New cards

UNC (Universal Naming Convention)

A standard format used to specify the location of network resources, such as shared folders, using a path that includes the server name and share name

(e.g., \\servername\sharename).