前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >CISSP考试指南笔记:5.12 快速提示

CISSP考试指南笔记:5.12 快速提示

作者头像
血狼debugeeker
发布2021-03-23 11:06:46
2950
发布2021-03-23 11:06:46
举报
文章被收录于专栏:debugeeker的专栏
  • Access is a flow of information between a subject and an object.
  • A subject is an active entity that requests access to an object, which is a passive entity.
  • A subject can be a user, program, or process.
  • Some security mechanisms that provide confidentiality are encryption, logical and physical access control, transmission protocols, database views, and controlled traffic flow.
  • Identity management (IdM) solutions include directories, web access management, password management, legacy single sign-on, account management, and profile update.
  • Password synchronization reduces the complexity of keeping up with different passwords for different systems.
  • Self-service password reset reduces help-desk call volumes by allowing users to reset their own passwords.
  • Assisted password reset reduces the resolution process for password issues for the helpdesk department.
  • IdM directories contain all resource information, users’ attributes, authorization profiles, roles, and possibly access control policies so other IdM applications have one centralized resource from which to gather this information.
  • An automated workflow component is common in account management products that provide IdM solutions.
  • User provisioning refers to the creation, maintenance, and deactivation of user objects and attributes as they exist in one or more systems, directories, or applications.
  • User access reviews ensure there are no active accounts that are no longer needed.
  • The HR database is usually considered the authoritative source for user identities because that is where each user’s identity is first developed and properly maintained.
  • There are five main access control models: discretionary, mandatory, role based, rule based, and attribute based.
  • Discretionary access control (DAC) enables data owners to dictate what subjects have access to the files and resources they own.
  • The mandatory access control (MAC) model uses a security label system. Users have clearances, and resources have security labels that contain data classifications. MAC systems compare these two attributes to determine access control capabilities.
  • Role-based access control (RBAC) is based on the user’s role and responsibilities (tasks) within the company.
  • Rule-based RBAC (RB-RBAC) builds on RBAC by adding Boolean logic in the form of rules or policies that further restrict access.
  • Attribute-based access control (ABAC) is based on attributes of any component of the system. It is the most granular of the access control models.
  • Three main types of constrained user interface measurements exist: menus and shells, database views, and physically constrained interfaces.
  • Access control lists are bound to objects and indicate what subjects can use them.
  • A capability table is bound to a subject and lists what objects it can access.
  • Some examples of remote access control technologies are RADIUS, TACACS+, and Diameter.
本文参与 腾讯云自媒体同步曝光计划,分享自作者个人站点/博客。
原始发表:2021/03/05 ,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体同步曝光计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
相关产品与服务
数据库
云数据库为企业提供了完善的关系型数据库、非关系型数据库、分析型数据库和数据库生态工具。您可以通过产品选择和组合搭建,轻松实现高可靠、高可用性、高性能等数据库需求。云数据库服务也可大幅减少您的运维工作量,更专注于业务发展,让企业一站式享受数据上云及分布式架构的技术红利!
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档