Domain 5 : Identity & Access Management Flashcards

1
Q

What is ABAC?

A

Attribute-based access control (ABAC) Attribute-based access control (ABAC) uses attributes associated with subjects, objects, and the environment to make access control decisions. These attributes can include user roles, time of day, location, and other context-specific information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethical Wall

A

An ethical wall is a screening mechanism that protects clients from a conflict of interest by preventing one or more attorneys from participating in any matters for which they have a conflict.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DAC

A

Discretionary Access Control (DAC) was originally defined by the Trusted Computer System Evaluation Criteria (TCSEC) as “a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Custodian

A

Data custodians are responsible for the safe custody, transport, storage of the data and implementation of business rules. Simply put, Data Stewards are responsible for what is stored in a data field, while data custodians are responsible for the technical environment and database structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whaling attack

A

A whaling attack is a method used by cybercriminals to masquerade as a senior player at an organization and directly target senior or other important individuals at an organization, with the aim of stealing money or sensitive information or gaining access to their computer systems for criminal purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Logical Access Control System (LACS)

A

An automated system that controls an individual’s ability to access one or more computer system resources such as a workstation, network, application, or database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mandatory access control (MAC)

A

Mandatory access control is a method of limiting access to resources based on the sensitivity of the information that the resource contains and the authorization of the user to access information with that level of sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Tokens

A

An access token is a compact digital artifact, typically in the form of a JSON Web Token (JWT), that grants permissions to a user (the resource owner) to access certain resources. These tokens act as an electronic key, ensuring that the user has the correct permissions to access the data they are requesting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privilege creep

A

Privilege creep is a cybersecurity term that describes the gradual accumulation of network access levels beyond what an individual needs to do their job. Users need specific privileges to perform tasks and job functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

False Acceptance Rate (FAR)

A

False acceptance rate (FAR): It stands for the percentage in which admission to the ear biometric system is mistakenly accepted for unauthorized users (i.e., imposters).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly