IS3230 CHAPTER 10 Flashcards
An element of the access control list known as (ACE) is called ___.
ACCESS CONTROL ENTRY (ACE)
A list of security policies that is associated with an object is called ___.
ACCESS CONTROL LIST (ACL)
Someone trying to compromise information or data is called ___.
ATTACKER
The service provided through Kerberos that identifies users on a computer system and is part of the Key Distribution Center is called ___.
AUTHENTICATION SERVICE
A message that is part of the Kerberos authentication process and is composed of the client ID and timestamp is called ___.
AUTHENTICATOR
A model that defines basic principles of access controls is called ___.
BELL-LaPADULA MODEL
Information that has cryptographic protection applied to it is called ___.
CLEAR TEXT
Products that are easily available to anyone is called ___.
COMMERCIAL OFF-THE-SHELF (COTS)
ISO/IEC 15408 standard for computer security is called ___.
COMMON CRITERIA
.Unauthorized access and release of information is called ___.
COMPROMISE
Used to control access to resources this is called ___.
CREDENTIALS
Used to protect data so that it cannot be easily read or understood is called ___.
CRYPTOGRAPHY
An attack against a system that limits it from doing the tasks it is intended to do is called ___.
DENIAL OF SERVICE (DoS) ATTACK
Provides a means of verifying identities of computer systems on an unprotected network. This is designed to provide strong authentication for client/server applications by using secret-key cryptography is called ___.
KERBEROS
The service or server that acts as both the ticket granting service and the authentication service is called ___.
KEY DISTRIBUTION CENTER (KDC)
The use of policies within a network infrastructure to limit access to resources until the system proves that it has complied with the policy is called ___.
NETWORK ACCESS CONTROL (NAC)