Access Controls Flashcards

(10 cards)

1
Q

Access Control

A

Access control → security mechanism that determines who can access a resource, what actions they are allowed to perform, and under what conditions access is permitted or denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Least Privilege

A

Least privilege → access control principle that ensures users are granted only the minimum permissions necessary to perform their job functions, reducing the impact of compromised accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MAC in Linux

A

Mandatory access control (MAC) → access control model where permissions are enforced by the system based on security policies and classifications, not by the resource owner, commonly used in high-security environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC in Linux

A

Discretionary access control (DAC) → access control model where the owner of a resource decides who can access it, offering flexibility but increasing the risk of improper permission settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RBAC

A

Role-based access control (RBAC) → access control model that assigns permissions based on job roles, making access management scalable and consistent across an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rule Based Access Control

A

Rule-based access control → access control model that grants or denies access based on predefined rules such as Internet Protocol address, device type, or network conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ABAC

A

Attribute-based access control (ABAC) → access control model that makes dynamic decisions using multiple attributes such as user identity, device posture, location, time, and resource sensitivity.

Like: Allow nurses to read patient records only if they are assigned to the patients ward, and at specific times, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Time of Day Restrictions

A

Time of day restrictions → access control technique that limits system access to specific hours, reducing exposure to unauthorized access during off-hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MFA

A

Multifactor authentication (MFA) → authentication method requiring two or more factor types such as something you know like a username and password, something you have like a smartphone or hardware token, something you are like a fingerprint or facial scan, or somewhere you are based on geographic location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Just-in-time Permission

A

Just-in-time permission → access control approach that provides temporary elevated access only when needed and automatically removes it after a short time to reduce standing privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly