CAMS-Access Control Protocols Flashcards
Attribute-Based Access (ABAC) Discretionary Access Control (DAC) History-Based Access Control (HBAC) Identity-Based Access Control (IBAC) Role-Based Access Control (RBAC)
Attribute-Based Access Control
Uses attributes and “if this, then that” rules to determine whether a user should be allowed to access data or take actions. It can utilize and combine attributes and rules from across systems.
This method is often considered most robust.
Discretionary Access Control
Allows the owner of the data to decide which users are granted access, allowing administrators to create a hierarchy within their system.
History-Based Access Control
Evaluates past behaviors to determine the likelihood of a user performing malicious activities.
Identity-Based Access Control
Involves basing data access on permissions associated with unique identities assigned to each user.
Role-Based Access Control
Protocol is currently the most popular among business and organizations.
By allowing access to resources based on the needs of predefined roles, it delivers only minimum amount of data needed to perform tasks.