IS 414 CH. 8 (VOCAB) Flashcards
Defense-in-depth
Employing multiple layers of controls to avoid a single point-of-failure
Time-based model
Implementing a combination of preventative, detective, and corrective controls that protect information assets long enough to enable an organization to recognize that an attack is occurring and take steps to thwart it before any information is lost
Social Engineering
using deception to obtain unauthorized access to information resources.
Authentication
Verifying the identity of the person or device attempting to access the system
Biometric identifier
A physical or behavioral characteristic that is used as an authentication credential
Multifactor authentication
The use of two or more types of authentication credentials in conjunction to achieve a greater level of security
Multimodal authentication
The use of multiple authentication credentials of the same type to achieve a greater level of security
Authorization
The process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform
Access control matrix
A table usd to implement authorization controls
Compatibility test
Matching the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action
Border router
A device that connects an organization’s information system to the internet
Firewall
A special-purpose hardware device or software running a general-purpose computer that controls both inbound and outbound communication between the system behind the firewall and other networks
Demilitarized zone (DMZ)
A separate network located outside the organization’s internal information system that permits controlled access from the internet
Routers
Special purpose devices that are designed to read the source and destination address field in IP packet headers to decide where to send (route) the packet next
Access control list (ACL)
A set of if-then rules used to determine what to do with arriving packets