Ch. 4 - Vocab Flashcards

1
Q

access control

A

implements a security policy that specifies who may have access to each specific system resource, and the type of access that is permitted in each instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

access control list

A

decomposition of the access matrix in column, providing the list of access rights of each user to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

access management

A

controls the ways entities are granted access to resources: consists of resource management, privilege management, and policy management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

access matrix

A

a matrix consisting of subjects attempting to access resources and objects that may be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attribute

A

are characteristics that define specific aspects of the subject, object, or environment conditions. It consists of a name and a value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attribute-based access control

A

controls access based on attributes of the user, the resource to be accessed, and current environmental conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attribute exchange network

A

an online Internet-scale gateway for identity service providers and relying parties to efficiently access online identity attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attribute provider

A

in the OITF, it verifies given attributes presented by subjects and creates conformant attribute credentials according tot the AXN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

auditor

A

in OITF, these are entities that check that parties’ practices have been in line with what was agreed from the OITF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

authorizations

A

otherwise known as privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

assessor

A

in OITF, these evaluate identity service providers and RPs, and certify if they are able to follow OITF provider’s blueprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

capability ticket

A

specifies authorized objects and operations for a particular user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cardinality

A

a maximum number with respect to roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

closed access control policy

A

authorizations specify permissions for an access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

credential

A

data structure that authoritatively binds an identity to a token possessed by a subscriber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

credential management

A

authoritatively binds an identity to a token possessed by a subscriber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

discretionary access control

A

controls access based on the identity of the requestor and on access rules stating what requestors are allowed to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dispute resolver

A

provides arbitration and dispute resolution under OIX guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

dynamic separation of duty

A

a user can take multiple role, but cannot take them simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

entitlements

A

otherwise known as privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

environment attribute

A

describes the operational, technical, and situational environment in which information access occurs, may include data and time, network security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

general role hierarchy

A

there is support for an arbitrary partial order to serve as the role hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

group

A

a set of users with may be given privileges to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

identity, credential, and access management

A

A comprehensive approach to managing and implementing identities, credentials, and access control. Consists of the categories Credential Management, Identity Management, Identity Federation, and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

identity federation

A

describes the means that allow an organization to trust digital identities created and issued by another organization

26
Q

identity management

A

concerned with assigning attributes to a digital identity and connecting that digital identity to an individual

27
Q

identity provider

A

in OITF, these authenticate user credentials and to vouch for the names of subjects

28
Q

Information Card Foundation

A

community of companies to evolve the information card system where information cards are personal digital identities people can use online

29
Q

kernel mode

A

where privileged instructions may be executed and protected area of memory may be accessed

30
Q

least privilege

A

least set of privileges necessary to perform a task

31
Q

limited role hierarchy

A

hierarchies are limited to simple structures such as trees or inverted trees

32
Q

mandatory access control

A

controls access based on comparing security labels with security clearances

33
Q

mutually exclusive roles

A

a user can be assigned to only one role in the set

34
Q

object

A

a resource to which access is controlled

35
Q

object attribute

A

can be extracted from the metadata of the object

36
Q

open access control policy

A

authorizations specify denials for an access

37
Q

Open Identity Exchange Corporation

A

international provider of certification trust frameworks conforming to OITF

38
Q

Open Identity Trust Framework

A

a open specification of trust framework for identity and attribute exchange

39
Q

OpenID

A

an open standard that allows users to be authenticated by certain cooperating sites using a third party service

40
Q

OpenID Foundation

A

organization committed to enabling, promoting, and protecting OpenID technologies

41
Q

owner

A

the creator of a resource

42
Q

permission

A

otherwise known as privileges

43
Q

policy

A

set of rules and relationships that govern allowable behavior

44
Q

prerequisite role

A

a user can only be assigned to a particular role if it is already assigned to some other specified role

45
Q

privilege

A

represent the authorized behavior of a subject

46
Q

protection domain

A

a set of objects together with access rights to these objects

47
Q

relying party

A

in OITF, these are entities delivering services to specific users

48
Q

resource

A

otherwise known as an object

49
Q

rights

A

otherwise known as privileges

50
Q

role-based access control

A

controls access based on the roles that user have within the system

51
Q

role constraints

A

can be used to restrict the number of assigned roles, provide a separation of duties and capabilities, or make one role as a prerequisite to another

52
Q

role hierarchies

A

makes use of the concept of inheritance to enable one role to implicitly include right associated with a subordinate role

53
Q

separation of duty

A

applies the mutual exclusion constraint to RBAC, could be static or dynamic

54
Q

session

A

a mapping between a user and activated subset of roles that a user is assigned

55
Q

static separation of duty

A

defines role memberships that are mutually exclusive

56
Q

subject

A

an entity capable of accessing objects

57
Q

subject attribute

A

attributes may include the name, organization, job title, or role

58
Q

trust framework

A

functions as a certification program, enabling a party who accept a digital identity credential to trust the identity, security, and privacy policies of the party who issues the credential

59
Q

trust framework provider

A

in OITF, this is an organization that translates the requirements of policymaker into a blueprint for a trust framework

60
Q

user mode

A

the default mode for a user program, certain area of memory are protected and certain instructions may not be executed