information systems security
Terms in this set (9)
A subject's ability to view, modify, or communicate with a new object. Access enables the flow of information between the subject and the object
designed to protect systems from unauthorized access in order to preserve data integrity
Access Control List (ACL)ez m
The list of permissions granted or denied that is attached to a file or folder.
Access control mechanism
administrative physical, or technical control that is designed to detect and prevent unauthorized access to a resource or environment.
A security principle indicating that individuals must be identifiable and must be held responsible for their actions.