Authentication, authorization, and accounting Flashcards

1
Q

Access controls:

A

Security controls that manage access, authorization, and accountability of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application programming interface (API) token

A

A small block of encrypted code that contains information about a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric encryption:

A

The use of a public and private key pair for encryption and decryption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Algorithm:

A

A set of rules used to solve a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Basic auth

A

The technology used to establish a user’s request to access a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bit:

A

The smallest unit of data measurement on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brute force attack:

A

The trial and error process of discovering private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cipher:

A

An algorithm that encrypts information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptographic key:

A

A mechanism that decrypts ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptography:

A

The process of transforming information into a form that unintended readers can’t understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption:

A

The process of converting data from a readable format to an encoded format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data owner:

A

The person that decides who can access, edit, use, or destroy their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hash function:

A

An algorithm that produces a code that can’t be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data custodian:

A

Anyone or anything that’s responsible for the safe handling, transport, and storage of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital certificate:

A

A file that verifies the identity of a public key holder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hash collision:

A

An instance when different inputs produce the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity and access management (IAM):

A

A collection of processes and technologies that helps organizations manage digital identities in their environment

13
Q

Hash table:

A

A data structure that’s used to store and reference hash values

13
Q

Information privacy:

A

The protection of unauthorized access and distribution of data

14
Q

Non-repudiation:

A

The concept that the authenticity of information can’t be denied

15
Q

Multi-factor authentication (MFA):

A

A security measure that requires a user to verify their identity in two or more ways to access a system or network

15
Q

OAuth:

A

An open-standard authorization protocol that shares designated access between applications

16
Q

Payment Card Industry Data Security Standards (PCI DSS):

A

A set of security standards formed by major organizations in the financial industry

17
Q

Personally identifiable information (PII):

A

Any information used to infer an individual’s identity

17
Q

Protected health information (PHI):

A

Information that relates to the past, present, or future physical or mental health or condition of an individual

17
Q

Principle of least privilege:

A

The concept of granting only the minimal access and authorization required to complete a task or function

17
Q

Public key infrastructure (PKI):

A

An encryption framework that secures the exchange of online information

18
Q

Rainbow table:

A

A file of pre-generated hash values and their associated plaintext

19
Q

Salting:

A

An additional safeguard that’s used to strengthen hash functions

20
Q

Security assessment:

A

A check to determine how resilient current security implementations are against threats

21
Q

Security audit:

A

A review of an organization’s security controls, policies, and procedures against a set of expectations

22
Q

Security controls

A

Safeguards designed to reduce specific security risks

23
Q

Separation of duties

A

The principle that users should not be given levels of authorization that would allow them to misuse a system

24
Q

Session ID:

A

A unique token that identifies a user and their device while accessing a system

24
Q

Session:

A

A sequence of network HTTP basic auth requests and responses associated with the same user

24
Q

Session cookie:

A

A token that websites use to validate a session and determine how long that session should last

25
Q

Session hijacking:

A

An event when attackers obtain a legitimate user’s session ID

26
Q

Single Sign-On (SSO):

A

A technology that combines several different logins into one

27
Q

Symmetric encryption:

A

The use of a single secret key to exchange information

28
Q

User provisioning:

A

The process of creating and maintaining a user’s digital identity