Lecture 02 - Basic Concepts of OSS Flashcards
Authorization
Process of verifying access permissions to resources
Authentication
Verifying user identity to grant access
Masquerader
Unauthorized user gaining access using another’s account
Misfeasor
Legitimate user misusing unauthorized access
Clandestine user
Rogue user taking supervisory authority to evade restrictions
Malwares
Includes viruses, worms, trojans, and harmful software
Program threats
User program causing OS processes to perform malicious tasks
System threats
Misuse of system services and network connections
TLS/SSL certificates
Encrypt and secure data transfer, enhancing website trust
URL authorization
Control access to URLs by enabling authorization in Windows settings
Access Controls
Regulate user-system interactions, limiting access to resources.
Discretionary Access Control (DAC)
Restricts information access based on user identity and group membership.
Mandatory Access Control (MAC)
Access based on security clearance levels, common in government sectors.
Role-Based Access Control (RBAC)
Access based on defined business roles rather than individual identities.
Attribute-Based Access Control (ABAC)
Access based on attributes and conditions assigned to users and resources.