Authentication, authorization, and accounting Flashcards
Access controls:
Security controls that manage access, authorization, and accountability of information
Application programming interface (API) token
A small block of encrypted code that contains information about a user
Asymmetric encryption:
The use of a public and private key pair for encryption and decryption of data
Algorithm:
A set of rules used to solve a problem
Basic auth
The technology used to establish a user’s request to access a server
Bit:
The smallest unit of data measurement on a computer
Brute force attack:
The trial and error process of discovering private information
Cipher:
An algorithm that encrypts information
Cryptographic key:
A mechanism that decrypts ciphertext
Cryptography:
The process of transforming information into a form that unintended readers can’t understand
Encryption:
The process of converting data from a readable format to an encoded format
Data owner:
The person that decides who can access, edit, use, or destroy their information
Hash function:
An algorithm that produces a code that can’t be decrypted
Data custodian:
Anyone or anything that’s responsible for the safe handling, transport, and storage of information
Digital certificate:
A file that verifies the identity of a public key holder
Hash collision:
An instance when different inputs produce the same hash value