Part-2 Acronyms Flashcards
IAM
Identity and access management
Security process that provides identity, the authentication and authorization mechanisms for users, computers and other entities to work with organizational assets like net works, operating systems and applications.
MAC
Mandatory access control
Subjects are assigned a security level or Clarence when they try to access an object their, clearance level must correspond to the object security level. If there is a match, the subject can access the objects; if there is no match, the subject is denied access. Mac security labels can generally be changed to only by system administrator.
DAC
Discretionary access control
When you were trying to access the file that is protected, all you need to do is Austin minute straighter to grant you access and then you can start using the file.
ACL
Access control list
List of subjects who are allowed access
RBAC
Role-based access control
Subjects are assigned to pre-defined roles, and network objects are configured to allow access only to specific roles. Access control based on the subjects assigned. An administrator assigns to a role only those privileges subjects in the role need to complete their work.
Rulebased access control
This is an access control technique that is based on a set of operational rules or restrictions.
ABAC
Attribute base access control
If x, then y
If a subject has both the type = database and department = customer service attributes then they are granted access to the computer database.
Since you, as a general administrator, do not possess these attributes, you’re denied access. Attributes are created ahead of time and must aptly Describe the important factors that distinguish one subject from another. Administrators can I sign these attributes during identity creation, or they can be assigned dynamically, depending on what the attributes are.
Physical access control devices
These are common in IAM architectures where organizations cannot rely solely on software based authentication and authorization solutions.
Example smart cards
Smart Cards are used as a “something you have “ for user to gain physical injury to location; to gain access to computer system or to initiate the transfer transaction with another entity.
Biometric devices
Fingerprint scanners Voice recognition devices Retinal scanners Iris scanners Facial recognition devices
Biometric factors
FAR false acceptance rate
FRR false rejection rate
CER Crossover error rate
Certificate based authentication
A technique used in a “something you have“authentication
CAC
Common access card
Directory service
A network service that stores identity information about all the objects in a particular network, including users, groups, servers, clients, printers, and network services.
LDAP
Lightweight directory access protocol
LDAP clients Authenticate to the LDAP service, and the service schema defines The tasks that clients can and cannot perform while accessing a directory database, the form the directory query must take, and how the directory server will respond.
Schema
The structure of the directory is controlled by a blank blank blank that defines rules for how objects are created and what their characters can be most blanks are extensible, so they can be modified to support the specific needs of an organization.
Active directory
This allows administrators to centrally manage and control access to resources using axis control us or ACL.
Tunneling
This is a data transport technique that can be used to provide remote access in which a data package is encrypted and encapsulated in another day to pack it in order to conceal the information of the packet inside.
Typically employed as a security measure in VPN connections
Remote access protocols
Point to point protocol (PPP)
Point to point tunneling protocol (PPTP)
Layer two tunneling protocol L2TP
Secure socket tunneling protocol SSTP