Authorization Flashcards

1
Q

process of giving someone permission to do or have something

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mediating access to resources based on identity and is generally policy-driven. Another term for Authorization.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encourages system designers and implementers to allow running code only the permissions needed to complete the required tasks and no more.

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A common mistake is to perform an authorization check by cutting and pasting an authorization code snippet into every page containing sensitive information.

A

Centralized Authorization Routines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Some applications check to see if a user can undertake a particular action, but then do not check if access to all resources required to complete the requested action is allowed.

A

Controlling Access to Protected Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ability to connect to a system or service

A

Network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access to operating system functionality

A

Host Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Locations that are housing information assets

A

Physical Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Operations evaluated as having an elevated risk. Examples: Financial transactions, changes to system configuration, or security administration

A

Restricted Functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Based on the identity and need-to-know of subjects and/or the groups to which they belong. A subject with certain access permissions is capable of passing on that access, directly or indirectly, to other subjects.

A

Discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Based on the sensitivity of the information contained in the objects / resources and a formal authorization. They restrain subjects from setting security attributes on an object and from passing on their access.

A

Mandatory access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A newer paradigm based on properties of an information exchange that may include identified attributes of the requesting entity, the resource requested, or the context of the exchange or the requested action.

A

Attribute-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Based on the roles played by users and groups in organizational functions.

A

Role-based access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly