Accounting
Authorization
Types
Other
100

What is keeping track of who does what on a computer or network.

What is Accounting?

100

The process of specifying the actions a user can perform once they have authenticated themselves.

What is Authorization?

100

Type 1 Authentication is...

What is something you know. 

Ex:

PIN

Passphrase

Pattern Lock

100

Proving you are who you say you are.

What is Authentication?

200

Anything that happens on a computer or network.

What is an Event?

EX:

Signing in or out, accessing or modifying a file, or visiting a website.

200

This model of ACL emphasizes the importance of the owner (creator) of a resource. 

What is Discretionary Access Control (DAC)?

EX:

Only person with full access to the resource

Can modify to the ACL to allow others to view  to view, edit, or copy

Can also transfer ownership to another user

200

By authenticating one time, you get access to all other related systems.

What is Single Sign On? 

200

This denies access to any user who does not have explicit authorization granted.

What is An Implicit Deny Rule?

300

Keeping a detailed list of anything the happens on a computer or network.

What is Logging?

Ex:

Users name, computer accessed, date and time of login, how long user was signed in, and websites visited. 

300

This grants permissions to users based on each user's role and modifies the ACL based on pre-configured rules.

What is Role-based access control systems?

Ex:

A student user has permission to view course resources, such as videos, labs, and text lessons. However they don't have permission to view other's grades or make direct changes to the gradebook.

Teachers have the same permissions as students, plus the ability to view and edit the grades of their students. However, they can't access grades of students in other teachers' classes.

Administrators can view and edit the grades for every student at the school, regardless of who the teacher is.

300

Type 2 Authentication is...

What is Something you have.

Ex:

Keys

Tokens

One Time Passwords

300

Users are given only the access they need to do their specific tasks.

What is the principle of Least Privilege?

400

When something goes wrong, they find out who was signed in, what files were accessed, and how permissions were used.

What is A system Accountant?

400

What is Uses security clearance levels to specify the users who can access designated resources?

What is Mandatory access control (MAC)

400

Using two or more of the types to gain access to a system.

What is Multifactor Authentication?

EX:

Use Type 1 (A password) and Type 2 (A smart card) to gain access.

400

Allowed actions that are assigned in an access control list (ACL).

What are Permissions?

500

Taking measures to verify the identity of someone performing an action.

What is Non-Repudiation?

Non-Repudiation techniques: 

Setting up a surveillance camera, Strong authentication protocols, signatures and receipts

500

Mandatory access control is an example of

What is Least Privilege?

500

Type 3 Authentication is...

What is Something you are. 

Ex:

Finger print

Face / Retina Scan 

Voice Recognition

500

Google Docs is an example of what kind of ACL Model?

What is Discretionary Access Control (DAC)?