IS4680 Chapter 9 Flashcards

1
Q

A-I-C

A

The availability, integrity, and confidentiality properties that describe a secure object. Often referred to as (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(ACLs) Access control lists

A

The lists of permissions that define which users or groups can access an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

The process of providing additional credentials that match the user ID or user name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

.The process of granting rights and permissions to access objects to a subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

.The assurance that information is available to authorized users in an acceptable time frame when the information is requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(CVV) Card Verification Value

A

.A number printed on credit cards that provides additional authentication when rendering pymt for online transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIA

A

.The confidentiality, integrity, and availability properties that describe a secure object. AKA (A-I-C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Due diligence

A

.The ongoing attention and care an organization places on security and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fingerprinting

A

.The process of determining the operating system and version of a network node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identification

A

.The process of providing user credentials or claiming to be a specific user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multi-factor authentication

A

.A type of authentication that uses more that two types of authentication to authenticate a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Object

A

.The target of an access request, such as a file, folder, or other resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Owner

A

.A user who has complete control of an object, including the right to grant access to other users or groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Permission

A

.The definition of what object access actions are permitted for a specific user or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Subject

A

.A user or principle object that requests to access a file, folder, or other resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two-factor authentication

A

.A type of authentication that uses two types of authentication to authenticate a user.

17
Q

Type I authentication (what you know)

A

.The info that only a valid user know. The most common example is a password or PIN.

18
Q

Type II authentication (What you have)

A

.A physical object that contains identity info, such as a token, card or other device.

19
Q

Type III authentication (What you are)

A

A physical characteristic (biometric), such as a fingerprint, handprint, or retinal characteristic.

20
Q

(UPS) Uninterruptible power supply

A

.A device that provides continuous usable power to one or more devices.

21
Q

War dialing

A

The process of instructing a computer to dial many telephone numbers looking for modems on the other end..