Ch. 4 - Vocab Flashcards

1
Q

access control

A

implements a security policy that specifies who may have access to each specific system resource, and the type of access that is permitted in each instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

access control list

A

decomposition of the access matrix in column, providing the list of access rights of each user to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

access management

A

controls the ways entities are granted access to resources: consists of resource management, privilege management, and policy management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

access matrix

A

a matrix consisting of subjects attempting to access resources and objects that may be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attribute

A

are characteristics that define specific aspects of the subject, object, or environment conditions. It consists of a name and a value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attribute-based access control

A

controls access based on attributes of the user, the resource to be accessed, and current environmental conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attribute exchange network

A

an online Internet-scale gateway for identity service providers and relying parties to efficiently access online identity attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attribute provider

A

in the OITF, it verifies given attributes presented by subjects and creates conformant attribute credentials according tot the AXN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

auditor

A

in OITF, these are entities that check that parties’ practices have been in line with what was agreed from the OITF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

authorizations

A

otherwise known as privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

assessor

A

in OITF, these evaluate identity service providers and RPs, and certify if they are able to follow OITF provider’s blueprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

capability ticket

A

specifies authorized objects and operations for a particular user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cardinality

A

a maximum number with respect to roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

closed access control policy

A

authorizations specify permissions for an access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

credential

A

data structure that authoritatively binds an identity to a token possessed by a subscriber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

credential management

A

authoritatively binds an identity to a token possessed by a subscriber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

discretionary access control

A

controls access based on the identity of the requestor and on access rules stating what requestors are allowed to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dispute resolver

A

provides arbitration and dispute resolution under OIX guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

dynamic separation of duty

A

a user can take multiple role, but cannot take them simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

entitlements

A

otherwise known as privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

environment attribute

A

describes the operational, technical, and situational environment in which information access occurs, may include data and time, network security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

general role hierarchy

A

there is support for an arbitrary partial order to serve as the role hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

group

A

a set of users with may be given privileges to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

identity, credential, and access management

A

A comprehensive approach to managing and implementing identities, credentials, and access control. Consists of the categories Credential Management, Identity Management, Identity Federation, and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
identity federation
describes the means that allow an organization to trust digital identities created and issued by another organization
26
identity management
concerned with assigning attributes to a digital identity and connecting that digital identity to an individual
27
identity provider
in OITF, these authenticate user credentials and to vouch for the names of subjects
28
Information Card Foundation
community of companies to evolve the information card system where information cards are personal digital identities people can use online
29
kernel mode
where privileged instructions may be executed and protected area of memory may be accessed
30
least privilege
least set of privileges necessary to perform a task
31
limited role hierarchy
hierarchies are limited to simple structures such as trees or inverted trees
32
mandatory access control
controls access based on comparing security labels with security clearances
33
mutually exclusive roles
a user can be assigned to only one role in the set
34
object
a resource to which access is controlled
35
object attribute
can be extracted from the metadata of the object
36
open access control policy
authorizations specify denials for an access
37
Open Identity Exchange Corporation
international provider of certification trust frameworks conforming to OITF
38
Open Identity Trust Framework
a open specification of trust framework for identity and attribute exchange
39
OpenID
an open standard that allows users to be authenticated by certain cooperating sites using a third party service
40
OpenID Foundation
organization committed to enabling, promoting, and protecting OpenID technologies
41
owner
the creator of a resource
42
permission
otherwise known as privileges
43
policy
set of rules and relationships that govern allowable behavior
44
prerequisite role
a user can only be assigned to a particular role if it is already assigned to some other specified role
45
privilege
represent the authorized behavior of a subject
46
protection domain
a set of objects together with access rights to these objects
47
relying party
in OITF, these are entities delivering services to specific users
48
resource
otherwise known as an object
49
rights
otherwise known as privileges
50
role-based access control
controls access based on the roles that user have within the system
51
role constraints
can be used to restrict the number of assigned roles, provide a separation of duties and capabilities, or make one role as a prerequisite to another
52
role hierarchies
makes use of the concept of inheritance to enable one role to implicitly include right associated with a subordinate role
53
separation of duty
applies the mutual exclusion constraint to RBAC, could be static or dynamic
54
session
a mapping between a user and activated subset of roles that a user is assigned
55
static separation of duty
defines role memberships that are mutually exclusive
56
subject
an entity capable of accessing objects
57
subject attribute
attributes may include the name, organization, job title, or role
58
trust framework
functions as a certification program, enabling a party who accept a digital identity credential to trust the identity, security, and privacy policies of the party who issues the credential
59
trust framework provider
in OITF, this is an organization that translates the requirements of policymaker into a blueprint for a trust framework
60
user mode
the default mode for a user program, certain area of memory are protected and certain instructions may not be executed