Term
|
Definition
Presenting credentials –Example: delivery driver presenting employee badge |
|
|
Term
|
Definition
Checking the credentials –Example: examining the delivery driver’s badge |
|
|
Term
|
Definition
Granting permission to take action –Example: allowing delivery driver to pick up package |
|
|
Term
|
Definition
Specific resource –Example: file or hardware device |
|
|
Term
|
Definition
User or process functioning on behalf of a user –Example: computer user |
|
|
Term
|
Definition
Action taken by the subject over an object –Example: deleting a file |
|
|
Term
|
Definition
| Standards that provide a predefined framework for hardware or software developers |
|
|
Term
| Access Control Models (cont’d.) |
|
Definition
Mandatory Access Control –Most restrictive access control model –Typically found in military settings –Two elements •Labels •Levels Security+ |
|
|
Term
| Discretionary Access Control (DAC) |
|
Definition
Least restrictive model –Every object has an owner –Owners have total control over their objects –Owners can give permissions to other subjects over their objects |
|
|
Term
| Role Based Access Control (RBAC) |
|
Definition
Also called Non-discretionary Access Control –Access permissions are based on user’s job function |
|
|
Term
| RBAC assigns permissions to particular roles in an organization |
|
Definition
| Users are assigned to only 1 role |
|
|
Term
| Rule Based Access Control (cont’d.) |
|
Definition
Each resource object contains access properties based on the rules –When user attempts access, system checks object’s rules to determine access permission –Often used for managing user access to one or more systems •Business changes may trigger application of the rules specifying access changes |
|
|
Term
|
Definition
Fraud can result from single user being trusted with complete control of a process –Requiring two or more people responsible for functions related to handling money –System is not vulnerable to actions of a single person |
|
|
Term
|
Definition
Database stored on a network –Contains information about users and network devices –Keeps track of network resources and user’s privileges to those resources –Grants or denies access based on its information |
|
|
Term
|
Definition
| Lightweight Directory Access Protocol |
|
|
Term
|
Definition
| Person responsible for the information |
|
|
Term
|
Definition
| Determines the level of security needed for the data and delegates security duties as required |
|
|
Term
|
Definition
| Determines that the file salary.xlsx can be read only by department managers |
|
|
Term
|
Definition
| Individual to whom day-to-day actions have been assigned by the owner |
|
|
Term
|
Definition
| periodically reviews security settings and maintains records of access by end users |
|
|
Term
|
Definition
| Sets and reviews security settings on Salary.xlsx |
|
|
Term
|
Definition
| user who accesses information in the course of routine job responsibilities |
|
|
Term
|
Definition
| Follows organization's security guidelines and does not attempt to circumvent security |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Right given to access specific resources |
|
|
Term
|
Definition
| Delivery person can only retrieve box by door |
|
|
Term
|
Definition
| user allowed to access only specific data |
|
|
Term
MAC Mandatory Access Control |
|
Definition
Most restrictive found in military settings 2 elements: labels and levels Matching object labels with subject labels based on their respective labels |
|
|
Term
| 2 major implementations of MAC |
|
Definition
|
|
Term
|
Definition
additional restriction not found in the original lattice model prevents subjects from creating new object or performing specific functions on objects that are lower level than their own |
|
|
Term
UAC Windows User Account Function |
|
Definition
Standard user who attempts to install software is required by UAC to enter a high level administrative password. Attempts to match the subjects privilege level with that of the object |
|
|
Term
DAC Discretionary Access Control |
|
Definition
least restrictive every object has an owner owners can create and access their objects freely the owner can give permissions to other subjects |
|
|
Term
|
Definition
Relies on decisions by the end user to set the proper level of security subjects permissions will be inherited by any programs that the subject executes inheritance are vulnerable to Trojans |
|
|
Term
RBAC Role Based Access Control |
|
Definition
Non discretionary Control based on users job function within an organization assigns permissions to a particular role, then assign users to those roles users and objects inherit all of the permissions for the role |
|
|
Term
RBAC Rule Based Access Control |
|
Definition
Automated provisioning dynamically assign roles to subjects based on a set of rules defined by a custodian each resource object contains a set of access properties based on rules cannot be changed by users |
|
|
Term
|
Definition
|
|
Term
| Best Practices for Access Control |
|
Definition
Separation of duties job rotation least privileges implicit deny mandatory vacations |
|
|
Term
|
Definition
| requires that if the fraudulent application of a process could be potentially result in a breach of security, then process should be divided between two or more individuals |
|
|
Term
|
Definition
| employees rotate either within their home department or across positions in other departments |
|
|
Term
|
Definition
| only minimum amount of privileges necessary to perform a job or function should be allocated |
|
|
Term
|
Definition
| if a condition is not explicitly met, then the request for access is rejected |
|
|
Term
|
Definition
| an audit is performed while they are on vacation |
|
|
Term
|
Definition
set of permissions that are attached to an object which subjects are allowed to access the object and what operations they can perform |
|
|