CF Domain 5 Flash Cards
Access Control System
Means to ensure that access to assets is authorized and restricted based on business and security requirements related to logical
Access control tokens
The system decides if access is to be granted or denied based upon the validity of the token for the point where it is read based on time, date, day, holiday, or other condition used for controlling validation.
Accountability
ensures that account management has assurance that only authorized users are accessing the system and using it properly
Attribute based access
control (ABAC)
This is an access control paradigm whereby access rights are granted to users with policies that combine attributes together
Authorization
The process of defining the specific resources a user needs and determining the type of access to those resources the user may have.
Active Directory Federation Services (ADFS)
identity access solution that provides client computers (internal or external to your network) with seamless SSO access to protected Internet-facing applications or services, even when the user accounts and applications are located in completely different networks or orgs
Crossover Error Rate
(CER)
point at which false acceptance (Type 2) error rate equals the false rejection (Type 1) error rate for a given sensor, in a given system and context; it is the optimal point of operation if the potential impacts of both types of errors are equivalent
Capability tables
list privileges assigned to subjects and identify the objects that subjects can access
Central Authentication Service (CAS)
an SSO implementation
Content-dependent control
Content-dependent access control adds additional criteria beyond identification and authentication: the actual content the subject is attempting to access; all employees of an org may have access to the HR database to view their accrued sick time and vacation time, but should an employee attempt to access the content of the CIO’s HR record, access is denied
Context-dependent access control
applies additional context before granting access, with time as a commonly used context
Cross-Site Request Forgery (CSRF)
(AKA XSRF) an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated
Discretionary access control
(DAC)
The system owner decides who gets access
False Acceptance Rate (Type
II FAR)
the percentage of identification instances in which unauthorized persons are incorrectly accepted.
False Rejection Rate (Type I FRR)
the percentage of identification instances in which authorized persons are incorrectly rejected