Access Control Principles and X

ProlificShark avatar
ProlificShark
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

Which principle is defined as 'the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner'?

Least privilege

What does RFC 2828 define as 'measures that implement and assure security services in a computer system, particularly those that assure access control service'?

Computer security

Which entity is typically held accountable for the actions they initiate and often have three classes: owner, group, world?

Subject

What does 'dual control' refer to in the context of access control?

<p>Two entities required to perform an action</p> Signup and view all the answers

What is the concept that equates with that of a process and is capable of accessing objects?

<p>Subject</p> Signup and view all the answers

Explain the concept of access control as defined in ITU-T Recommendation X.800.

<p>The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.</p> Signup and view all the answers

According to RFC 2828, what does computer security measures implement and assure in a computer system?

<p>Security services, particularly those that assure access control service.</p> Signup and view all the answers

What are the access control requirements mentioned in the text?

<p>Reliable input, support for fine and coarse specifications, least privilege, separation of duty, open and closed policies, policy combinations and conflict resolution, and administrative policies.</p> Signup and view all the answers

Define the 'subject' in the context of access control.

<p>An entity capable of accessing objects, typically held accountable for the actions they initiate, and often classified as owner, group, or world.</p> Signup and view all the answers

Explain the relationship between access control and other security functions as described in the text.

<p>Access control is an essential part of computer security measures, particularly those that assure security services in a computer system.</p> Signup and view all the answers

More Quizzes Like This

Use Quizgecko on...
Browser
Browser