Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

Access Control Systems and Methodology by Mind Map: Access Control Systems and Methodology
5.0 stars - 1 reviews range from 0 to 5

Access Control Systems and Methodology

Access Control Measures

Preventive

Detective

Other

Areas of Application

Identity, Authentication, and Authorization

Identity and Authentication are not the same thing

Identity

Authentication

Authorization

Threats

Application threats

Transmission Threats

Malicious Code Threats

Password Threats

Top Level

Accountability

Access Controls

Lattices

Methods of Attack

Overview

Threats to Access Control

Current Practices

Systems and Methodologies

Mandatory (MAC)

Discretionary (DAC)

Non-Discretionary

Role based (RBAC)

Rule-Based (RSBAC)

List Based (Access Control LIsts)

Token Based

New Implementations

Terms and Principles

Data owner

Data custodian

Least Privilege

Centralized Contol

Decentralized Contol

Separation of Duties

Rotation of Duties

Access Control Model Terminology

pranksters

Techniques

Access Management

Access Control Modes

Access Control Models

Lattice

Confidentiality: Bell-LaPadula

Integrity: Biba

Commercial: Clark-Wilson

Others