164. Access Control Models

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards
Mandatory access control
Employs security labels to authorize user access to specific resources
2
New cards
MAC
Mandatory access control
3
New cards
Discretionary access control
Resource's owner determines which users can access each resource
4
New cards
DAC
Discretionary access control
5
New cards
Role-based access control
Assigns users to roles and uses these roles to grant perms to resources
6
New cards
RBAC
Role-based access control or Rule-based access control
7
New cards
Rule-based access control
Enables administrators to apply security policies to all users
8
New cards
Attribute-based access control
Uses object characteristics for access control decisions
9
New cards
ABAC
Attribute-based access control
10
New cards
User Attributes
User's name, role, org, ID, or security clearance level
11
New cards
Environment Attributes
Time of access, data location, and current org's threat level
12
New cards
Resource Attributes
File creation date, resource owner, file name, and data sensitivity
13
New cards

Time-of-day Restrictions

Controls restrict resource access based on request times
14
New cards
Principle of Least Privilege
Granting users the minimum access required for their tasks, without extra privileges
15
New cards
Permission or Authorization Creep
Occurs when a user gains excessive rights during their career progression in the company