IS3230 CHAPTER 1 Flashcards
The ability of a subject and an object to interact is called ___.
ACCESS
The process or mechanism of granting or denying use of a resource: typically applied to users or generic network traffic is called ___.
ACCESS CONTROL
The process of confirming the identity of a user. Also, ensuring that a sender and recipient are who they say they are is called ___.
AUTHENTICATION
A way of confirming the identity of a subject. The three ___ are “something you know”; “something you have”; and “something you are”.
AUTHENTICATION FACTOR
The decision to allow or deny a subject access to an object. After a user has been authenticated, for example, authorization determines if the user has the rights to perform specific actions on the network or system. This is known as ___.
AUTHORIZATION
An authentication system based on physical characteristics or behavioral tendencies of an individual is called ___.
BIOMETRICS
The process by which a subject or object identifies itself to the access control system. In the case of users, ____ uniquely distinguishes an individual. In most cases it needs to be proved prior to authentication the user.
IDENTIFICATION
- Anything that is passively acted upon by a subject or
2. The resource to which a subject desires access. Common ___ are data, networks, and printers.
OBJECT
A phrase or sentence used in place of a password is a ___ and is often used as mnemonic devices to help remember complex passwords.
PASSPHRASE
A secret combination of characters known only to the subject is a ___.
PASSWORD
The process of ensuring that no one without the proper credentials can physically access resources is called ___.
PHYSICAL SECURITY
- A document that describes specific requirements or rules that must be met in a given area.
- A formal statement of management intent regarding the business practices of an organization. A ___ is binding upon all affected individuals.
POLICIES
A defined series of steps or actions for achieving an objective or result. Example, a defined workflow used to enforce policies is considered a ___ or a set of ___. This is often written to ensure that tasks are completed in the same way each time, preventing unexpected problems.
PROCEDURES
Something only the subject and the authentication system know. It can be a piece of data that is known only to the parties that communicating with one another. A ___ is used for encryption.
SHARED SECRET
The user, network, system, process or application requesting access to a resource is called ___.
SUBJECT