Security Chapter 4 Review

Ace your homework & exams now with Quizwiz!

Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model.

ABAC

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

Access control

__________ is verification that the credentials of a user or other system entity are valid.

Authentication

_________ is the granting of a right or permission to a system entity to access a system resource.

Authorization

__________ refers to setting a maximum number with respect to roles.

Cardinality

__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.

Constraints

__________ is the traditional method of implementing access control.

DAC

__________ controls access based on comparing security labels with security clearances

MAC

__________ is based on the roles the users assume in a system rather than the user's identity.

RBAC

The __________ component deals with the management and control of the ways entities are granted access to resources.

access management

The three types of attributes in the ABAC model are subject attributes, object attributes, and ___________ attributes.

environment

Traditional RBAC systems define the access rights of individual users and groups of users.

f

A concept that evolved out of requirements for military information security is ______ .

mandatory access control

A(n) __________ is a resource to which access is controlled.

object

The basic elements of access control are: subject, __________, and access right.

object

A __________ is a named job function within the organization that controls this computer system.

role

A __________ is an entity capable of accessing objects.

subject

A user may belong to multiple groups.

t

Access control is the central element of computer security.

t

An access right describes the way in which a subject may access an object.

t

An auditing function monitors and keeps a record of user accesses to system resources.

t

The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.

t


Related study sets

Multi-drug Resistant Organisms "BAD BUGS"

View Set

KHAN ACADEMY & KAPLAN NERVOUS SYSTEM

View Set

11. AWS CCP Knowledge Review - Cloud Benefits

View Set

ITE115 Canvas Module 1: Take Quiz (from Textbook Module 2)

View Set

Latina Poetry as an Expression of Cultural Heritage

View Set

Final Exam - Texas Life and Health

View Set

clinical psych ch 5 possible quiz questions

View Set

Furniture, Finishes, Equipment, Lighting

View Set