IS4680 Chapter 9 Flashcards
A-I-C
The availability, integrity, and confidentiality properties that describe a secure object. Often referred to as (CIA)
(ACLs) Access control lists
The lists of permissions that define which users or groups can access an object.
Authentication
The process of providing additional credentials that match the user ID or user name.
Authorization
.The process of granting rights and permissions to access objects to a subject.
Availability
.The assurance that information is available to authorized users in an acceptable time frame when the information is requested.
(CVV) Card Verification Value
.A number printed on credit cards that provides additional authentication when rendering pymt for online transactions.
CIA
.The confidentiality, integrity, and availability properties that describe a secure object. AKA (A-I-C)
Due diligence
.The ongoing attention and care an organization places on security and compliance.
Fingerprinting
.The process of determining the operating system and version of a network node.
Identification
.The process of providing user credentials or claiming to be a specific user.
Multi-factor authentication
.A type of authentication that uses more that two types of authentication to authenticate a user.
Object
.The target of an access request, such as a file, folder, or other resource.
Owner
.A user who has complete control of an object, including the right to grant access to other users or groups.
Permission
.The definition of what object access actions are permitted for a specific user or group.
Subject
.A user or principle object that requests to access a file, folder, or other resource.