Chapter 13 - Authentication and Access Control Flashcards
is the process of verifying the identity of a user or
device before allowing access to the network.
Authentication and Access Control
This process is twofold and includes ensuring that only authorized computers get to enter your network and making sure data you’re sending back and forth between networks is secured
Security Filtering
(ACLs) are used to enforce security policies by defining which users or devices can access specific network resources.
Access Control Lists
creates secure communication channels over untrusted networks by encapsulating data within another protocol.
Tunneling
protects data by converting it into an unreadable format ensuring that only authorized users with the correct decryption key can access the original information.
Encryption
enables users to connect to a
network or system from a remote location.
Remote Access
(MFA)
multi-factor authentication
(2FA) adds an extra layer of security by combining something the user knows (password) with something they have (e.g., a mobile device for a verification code).
Two-Factor
Authentication