access control Flashcards
____ are data, applications, systems, networks, and physical space are classified as what?
objects
_____ are the users, applications, or processes that need access to objects.
subjects
what are the AAA’s of access control
authentication
authorization
auditing
______ access control stops unwanted or unauthorized activity
preventative
_____ access control searches for details about the attack or the attacker
detective
______ access control implements short-term repairs to restore basic functionality following an attack
corrective
______ access control discourages continued or escalating of attack during an attack
deterrent
_____ access control restores the system to normal operations after the attack and short-term stabilization period
recovery
alternatives to primary access control is called
compensative
______ controls are policies that describe accepted practices.
administrative
_____ controls are computer mechanisms that restrict access.
technical
an arrangement made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group
Federated identity management (FIM)
this access control model is centralized and uses clearance and classification labels
bell la-padula and
biba
_____ is a non discretionary
access control model based on controlled intermediary access application that prevent direct access to the back-end database
clark-wilson
____ states that a system should never reside in a non-secure state
state machine