6.3 Flash Cards -Domain 3 - Access Control Concepts

Audit

Pasted image 20240329095129.png

Crime Prevention Through Environmental Design (CPTED)

Pasted image 20240329095218.png

Defense in Depth

Pasted image 20240329095252.png

Discretionary Access Control (DAC)

Pasted image 20240329095327.png

Encrypt

Pasted image 20240329095411.png

Firewalls

Pasted image 20240329095433.png

Insider Threat

Pasted image 20240329095549.png

iOS

Pasted image 20240329095607.png

Layered Defense

Pasted image 20240329095627.png

Linux

Pasted image 20240329095651.png

Log Anomaly

Pasted image 20240329095715.png

Logging

Pasted image 20240329095735.png

Logical Access Control System

Pasted image 20240329095845.png

Mandatory Access Control

Pasted image 20240329095910.png

Mantrap

Pasted image 20240329095943.png

Object

Pasted image 20240329100126.png

Physical Access Controls

Pasted image 20240329100211.png

Principle of Least Privilege

Pasted image 20240329100236.png

Privileged Account

Pasted image 20240329100310.png

Ransomware

Pasted image 20240329100338.png

Role-Based Access Control (RBAC)

Pasted image 20240329100426.png

Rule

Pasted image 20240329100456.png

Segregation of Duties

Pasted image 20240329100522.png

Subject

Pasted image 20240329100545.png

Technical Controls

Pasted image 20240329100610.png

Turnstile

Pasted image 20240329100635.png

Unix

Pasted image 20240329100717.png

User Provisioning

Pasted image 20240329100736.png