Domain 5 Flashcards
Access Control System
Means to ensure that access to assets is authorized and restricted based on business and security requirements related to logical and physical systems.
Access Control Tokens
The system decides if access is to be granted or denied based upon the validity of the token for the point where it is read based on time, date, day, holiday or other condition used for controlling validation.
Accounting
Access control process which records information about all attempts by all identities to access any resources of the system. See also authentication, authorization.
Attribute- based Access Control (ABAC)
This is an access control paradigm whereby access rights are granted to users with policies that combine attributes together.
Authentication
Access control process that validates the identity being claimed by a user or entity is known to the system, by comparing one or more factors of identification. Factors typically include something the user is, something they have and something they know (such as a fingerprint, a hardware questions). Single-factor (SFA) authenticates with only one of these; multi-factor (MFA) uses two or more. security token and answers to challenge
Authorization
The process of defining the specific resources a user needs and determining the type of access to those resources the user may have.
Crossover Error Rate (CER)
This is the point at which the false acceptance (or Type 2) error rate equals the false rejection (Type 1) error rate, for a given sensor used in a given system and context. This is only the optimal point of operation if the potential impacts of both types of errors are equivalent.
Data Custodian, Custodian
The individual who manages permissions and access on a day-to-day basis based on instructions from the data owner. Responsible for protecting an asset that has value, while in the custodian’s possession.
Data Owner/ Data Controller
The individual or entity who is responsible to classify, categorize and permit access to the data. The data owner is the one who is best familiar with the importance of the data to the business.
Data Processor
Any entity, working on behalf or at the direction of the data controller, that processes personally identifiable information (PII).
Discretionary Access Control (DAC)
Access control in which the system owner decides who gets access.
Ethical Wall
The separation of information, assets or job functions to establish and enforce need to know boundaries or prevent conflict of interest situations from arising. The use of administrative, physical and/ or logical controls to establish, maintain and monitor such separations. Also known as a compartment.
False Acceptance Rate (FAR or Type 2)
Incorrectly authenticating a claimed identity as legitimate and recognized and granting access on that basis.
False Rejection Rate (FRR or Type 1)
Incorrectly denying authentication to a legitimate identity and thus denying it access.
Granularity of Controls
Level of abstraction or detail at which a security function can be configured or tuned for performance and sensitivity purposes.