Back to AI Flashcard MakerInformation Technology /CompTIA Security+ (SY0-601): Weak Points #3

CompTIA Security+ (SY0-601): Weak Points #3

Information Technology36 CardsCreated 7 months ago

This section compares various access control methods including Rule-Based Access Control, which uses ACLs and labels; Attribute-Based Access Control (ABAC), which considers context like user attributes and environment; and Mandatory Access Control (MAC), where access policies are centrally enforced using sensitivity labels and clearance levels.

Rule-Based Access Control

An access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries

Label-based access control that defines whether access should be granted or denied to objects by comparing the object label and the subject label

Rate to track your progress ✦

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/36

Key Terms

Term
Definition

Rule-Based Access Control

An access control model in which access to resources is granted or denied depending on the contents of Access Control Li...

ABAC Access Policy Properties

Subject (user or process requesting access)
Type of action (for example “read”, “write”, “execute”)
Resource type ...

MAC Characteristics

Users are not allowed to change access policies at their own discretion

Labels and clea...

PAM

Privileged Access Management:

A security solution that provides control over elevated (...

DER Characteristics

Encoded in binary format

.der and .cer file extension

...

PEM Characteristics

Encoded in text (ASCII Base64) format

.pem .crt .cer .key file extensions

PFX & P12 Characteristics

Encoded in binary format

.pfx .p12 file extensions

Gen...