module 8 Flashcards
is a method for confirming the identity of a computer user. Authentication can be done with passwords, tokens or biometrics. More robust authentication involves two-factor authentication and multi-factor authentication.
Authentication
is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.
Authorization
four most common access control models
mandatory
discretionary
role based
rule based access control
used by administraters to help organize and streamline the process of managing access.
four common access controls
is a mechanism to ensure that individuals cannot deny their actions.
non-repudiation
occurs when organizations use software that filters content to prevent the accidental or malicious transmission of unauthroized information.
content filtering
scrambles cleartext information into an alternate form (cyphertext) that requires a key or password to decrypt.
encryption
are hardware and/or software that guards a private network by analyzing incoming and outgoing information for the correct markings.
firewalls
involves full-time monitoring tools that search for patterns in network traffic to identify intruders. IDS was cutting edge a decade ago, but has now evolved into Intrustion Detection and Prevention Systems.
intrusion Detection System (IDS)
is sometimes shortened to Intrusion Prevention System (IPS). An IDPS is a network security appliance that monitors network and system activities to detect possible intrusions. In addition to detecting intrustions, it can also prevent them by sending alarms, block malicious network messages (and their responses) so they do not reach their destination, and reset network connections
Intrusion Detection & Prevention System (IDPS)