Chapter 6 Key Terms Flashcards

1
Q

Access control

A

Access control is the ability to permit or deny access to resources on a network or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access control policy

A

An access control policy defines the steps and measures that are taken to control access to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control system

A

An access control system includes policies, procedures, and technologies that are implemented to control access to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

Authentication is the process of validating identity. It includes the identification process, a user providing input to prove identity, and the system accepting that input as valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

Authorization is granting or denying access to an object based on the level of permissions or the actions allowed with the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Auditing

A

Auditing, also referred to as accounting, is maintaining a record of the activity within the information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Objects

A

Objects are data, applications, systems, networks, and physical space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Subjects

A

Subjects are users, applications, or processes that need access to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identification

A

The initial process of confirming the identity of a user requesting credentials. This occurs when a user enters a user ID at logon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A

The verification of the issued identification credentials. It is usually the second step in the identification process and establishes that you are who you say you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multifactor authentication

A

A method of confirming identity by using two or more pieces of evidence (or factors) to an authentication mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

False negative

A

An error that occurs when a person who should be allowed access is denied access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

False positive

A

An error that occurs when a person who should be denied access is allowed access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Crossover error rate

A

The point at which the number of false positives matches the number of false negatives in a biometric system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Processing rate

A

The number of subjects or authentication attempts that can be validated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authorization

A

The process of controlling access to resources, such as computers, files, or printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access control list (ACL)

A

A list that identifies users or groups who have specific security assignments to an object.

18
Q

Permission

A

A permission controls the type of access that is allowed or denied for an object.

19
Q

Discretionary ACL (DACL)

A

An implementation of discretionary access control (DAC) in which owners add users or groups to the DACL for an object and identify the permissions allowed for that object.

20
Q

System ACL (SACL)

A

An ACL Microsoft uses for auditing to identify past actions users have performed on an object.

21
Q

Security Principal

A

An object such as a user account, computer account, and security group account that can be given permissions to an object.

22
Q

Active Directory

A

Developed by Microsoft, Active Directory is a centralized database that contains user accounts and security information. It is included in most Windows Server operating systems as a set of processes and services.

23
Q

Organizational unit (OU)

A

In Active Directory, an organizational unit is a way to organize such things as users, groups, computers, etc. It is also referred to as a container object.

24
Q

Domain objects

A

All network resources, such as users, groups, computers, and printers are stored as objects in Active Directory.

25
Q

Azure Active Directory

A

Azure AD is Microsoft’s cloud-based identity and access management service. It helps employees sign in and access resources.

26
Q

Domain

A

A domain is an admiratively-defined collection of network resources that share a common directory database and security policies. The domain is the basic administrative unit of an Active Directory structure.

27
Q

Tree

A

A tree is a group of related domains that share the same contiguous DNS namespace.

28
Q

Forest

A

A forest is a collection of related domain trees. The forest establishes the relationship between trees that have different DNS namespaces.

29
Q

Organizational unit

A

An organizational unit is similar to a folder. It subdivides and organizes network resources within a domain.

30
Q

Object

A

Each resource within Active Directory is identified as an object.

31
Q

Domain controller

A

A domain controller is a server that holds a copy of the Active Directory database. The copy of the Active Directory database on a domain controller can be written to.

32
Q

Replication

A

The process of copying changes to Active Directory on the domain controllers.

33
Q

Member servers

A

Member servers are servers in the domain that do not have the Active Directory database.

34
Q

Policy

A

A set of configuration settings applied to users or computers.

35
Q

Multifactor Authentication

A

Using more than one method to authenticate users.

36
Q

Smart Cards

A

Similar in appearance to credit cards, smart cards have an embedded memory chip that contains encrypted authentication information. These cards are used for authentication.

37
Q

Microprobing

A

The process of accessing a smart cards chip surface directly to observe, manipulate, and interfere with the circuit.

38
Q

Radio frequency identification (RFID)

A

The wireless, non-contact use of radio frequency waves to transfer data.

39
Q

Dameon

A

A Linux or UNIX program that runs as a background process, rather than being under the direct control of an interactive user.

40
Q

Remote access policies

A

Remote access policies are used to restrict access. The policies identify authorized users, conditions, permissions, and connection parameters such as time of day, authentication protocol, caller id, etc.

41
Q

Authentication

A

Authentication is the process of validating user credentials that prove user identity.