click below
click below
Normal Size Small Size show me how
CYB1UofI_FISCH3.1
Introduction:Authorization&AccessControl
| Question | Answer |
|---|---|
| what happens after you've received a party's claim of identity and established whether that claim is valid | you have to decide whether to allow the party access to your resources |
| how can you decide whether to allow the party access to your resources | authorization and access control |
| what is authroization | the process of determine exactly what an authenticated party can do |
| how do you typically implement authorization | using access controls |
| what are access controls | tools and systems you use to deny or allow access |
| what can you base access controls on | physical attributes, sets of rules, lists of individuals or systems or other more complex factors |
| when it comes to logical resources where will you probably find simple access controls implemented | in everyday applications and operating systems |
| when it comes to logical resources where will you probably find elaborate, multilevel configurations access controls implemented | in military or government enviorments |