information systems security
Terms in this set (9)
A subject's ability to view, modify, or communicate with a new object. Access enables the flow of information between the subject and the object
designed to protect systems from unauthorized access in order to preserve data integrity
Access Control List (ACL)ez m
The list of permissions granted or denied that is attached to a file or folder.
Access control mechanism
administrative physical, or technical control that is designed to detect and prevent unauthorized access to a resource or environment.
A security principle indicating that individuals must be identifiable and must be held responsible for their actions.
YOU MIGHT ALSO LIKE...
Academic Word Lists - AWL Sublists
CH4 User Access Control
Chapter 4- Access Control
THIS SET IS OFTEN IN FOLDERS WITH...
Official (ISC)² CISSP - Domain 3: Security Architecture and Engineering
Official (ISC)² CISSP - Domain 4: Communication and Network Security
Official (ISC)² CISSP - Domain 5: Identity and Access Management
Official (ISC)² CISSP - Domain 6: Security Assessment and Testing