Ch.11 Flashcards
the mechanism used in an information system for granting or denying approval to use specific resources
access control
a set of permissions that is attached to an object
access control list (ACL)
a predefined framework found in hardware and software that a custodian can use for controlling access
access control model
the process of setting a user’s account to expire
account expiration
the least restrictive access control model in which the owner of the object has total control over it
Discretionary Access Control (DAC)
the second version of the Terminal Access Control Access Control System (TACACS) authentication service
Extended TACACS (XTACACS)
a Microsoft Windows feature that provides centralized management and configuration of computers and remote users
group policy
rejecting access unless a condition is explicitly met
implicit deny
the act of moving individuals from one job responsibility to another
job rotation
an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users
Kerberos
an attack constructs LDAP statements based on user input statements, allowing the attacker to retrieve information from the LDAP database or modify its content
LDAP injection attack
providing only the minimum amount of privileges necessary to perform a job or function
least privilege
a protocol for a client application to access in X.500 directory
lightweight directory access protocol (LDAP)
the most restrictive access control model, typically found in military settings in which security is of supreme importance
mandatory access control (MAC)
requiring that all employees take vacations
mandatory vacations
an industry standard authentication service with widespread support across nearly all vendors of networking equipment
remote authentication dial in user service (RADIUS)
a “real-world” access control model in which access is based on a user’s job function within the organization
role based access control (RBAC)