1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Mandatory Access Controll
Strictest model. Labels and clearance levels can only be applied and changed by an administrator. Every resource has a sensitivity label matching a clearance level assigned to a user.
Discretionary Access Control
A security model that allows resource owners to determine who can access their resources, granting them the ability to assign permissions as they see fit.
Attribute Based Access Control
A security model that grants access based on user attributes, such as roles, policies, and environment conditions, allowing for more dynamic and fine-grained control. Uses statements close to natural language
Rules Based Access Control
A security model that grants access to resources based on pre-defined rules and conditions, often incorporating attributes and policies to automate permission management.
Least Privilege
A security principle that suggests users should be granted the minimum level of access necessary to perform their job functions, thus reducing the risk of unauthorized access or damage.
Managerial Controls
Policies, procedures, and regulations designed to manage and reduce risks to an organization's information security. (e.g., Disaster Recover Plan & Business Continuity Plan)
Technical Controls
Security measures implemented through technology to protect information systems and data.
Operational Controls
Procedures and processes implemented to manage day-to-day operations and mitigate risks to information security.
Physical Controls
Measures that protect physical assets and facilities, such as locks, access controls, and security personnel.
Compenstating Controls
Alternative security measures used when primary controls are not feasible, ensuring adequate protection of information systems.
Detective Controls
Measures designed to identify and respond to security incidents or breaches, such as logging and monitoring systems.
Corrective Controls
Measures that are implemented to rectify security incidents or breaches after they occur, restoring systems to normal operations and mitigating further damage.
Deterrent Controls
Measures that discourage security violations by instilling a perception of risk or consequence, such as warning signs and access restrictions.
Preventative Controls
Measures implemented to prevent security incidents or breaches from occurring, including firewalls, access controls, and security training.