Module 02: Identification, Authentication, and Authorization Flashcards
Defined as a user or a process that that attempt to access the objects. The ______ are those entities that perform certain actions on the system.
Subject
An explicit resource on which an access restriction is imposed. The access controls implemented on this further control the actions performed by the user.
Object
Monitors the restrictions imposed on the basis of certain access control rules. it implements a set of rules on the ability of the subject to perform certain actions on the object.
Reference Monitor
An action performed by a subject on a object. A user trying to delete a file is an example.
Operation
Determines the usage and access policies for the users. A user can access a resource only if they have access rights to that resource. This is applied in the case of data that has been marked as highly confidential.
Mandatory Access Control (MAC)
Also can be termed as need-to-know access model where the decision can be taken by an owner to provide or any access to specific user or a group of users. Determines the access control taken by any possessor of an object in order to decide the access control of a subject on that object.
Discretionary Access Control (DAC)
The access permissions are available based on the access policies determined by the system. The access permissions are beyond the user control which implies that users cannot amend the access policies created by the system.
Role-Based Access Control (RBAC)
Permissions are assigned to a user role dynamically based on a set of rules defined by the administrator
Rule-Based access Control (RB-RBAC)