Security 6.4 Flashcards
Authentication
proving that a subject is who they claim to be
Authorization
determine what rights or permissions subjects should have on each resource and enforcing those rights
Accounting
tracking authorized and unauthorized usage of a resource or use of rights by a subject.
Single Factor
1 item of authentication
EX. using 1 aspect for instance something you know like a pin and passowrd, or something you have hardware/software token, where you are, who you are
A.C.L.
Access Control List
List of subjects and the rights or permissions they have been granted on the object.
Something you know of Authentication factors
Pin and Password, Security Question
Something you have of Authentication Types
One-Time Password, Software Token
Who you are type of Authentication
Biometrics
Role Based Access
set of roles are defined and users allocated to those roles
Discretionary Access Control
The owner is the original creator of the resource.
Granted full control over the resource, can modify its access control list to grant rights to others
Mandatory Access Control
Based on security clearance levels.
Rule Based access control
refers to any sort of access control model where access control policies are determined by system enforced rules.
User Account Types
ensures the identity of someone using a computer is validated.
Which non-repudiation mechanism can prove that a person was genuinely operating an account and that it was not hijacked?
biometric authentication device
Which non-repudiation mechanism can prove that the user was an author of a document?
A physical or digital signature