From the course: CompTIA CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Subject/object model

Subject/object model

From the course: CompTIA CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management

Start my 1-month free trial

Subject/object model

- [Instructor] When security professionals discuss access control systems, we use some language that might be a little confusing to the newcomer. Let's talk a little bit about the language that we use to discuss authorization, the subject/object model. In an access request, the subject is the person, device, or application that is requesting access to a resource. We usually think of subjects as users, such as when a user requests access to a file stored on a server or attempts to log in to a web-based system. But users aren't the only type of subject. Devices may also be the subject of an access control request. For example, a digital sign in an office lobby might need to access the wireless network and might be authorized that access as a device. Applications may also be subjects. For example, an inventory tracking system may need to access information stored in a database. In that case, the inventory tracking application…

Contents