CAMS-Access Control Protocols Flashcards

Attribute-Based Access (ABAC) Discretionary Access Control (DAC) History-Based Access Control (HBAC) Identity-Based Access Control (IBAC) Role-Based Access Control (RBAC)

1
Q

Attribute-Based Access Control

A

Uses attributes and “if this, then that” rules to determine whether a user should be allowed to access data or take actions. It can utilize and combine attributes and rules from across systems.

This method is often considered most robust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discretionary Access Control

A

Allows the owner of the data to decide which users are granted access, allowing administrators to create a hierarchy within their system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

History-Based Access Control

A

Evaluates past behaviors to determine the likelihood of a user performing malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identity-Based Access Control

A

Involves basing data access on permissions associated with unique identities assigned to each user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Role-Based Access Control

A

Protocol is currently the most popular among business and organizations.

By allowing access to resources based on the needs of predefined roles, it delivers only minimum amount of data needed to perform tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly