Physical& Information Security (2) Flashcards
Information Security
Process by which an organization protects the creation, collection, storage, use, transmission and disposal of information.
Authentication
Process of verifying the identity of an individual user, machine, software component or any other entity.
Authentication Factor
Something a person is, something a person knows or something a person has.
Single-Factor Authentication
Method to verify an identity using one type of authentication factor.
Multifactor Authentication
Method to verify an identity using two or more types of authentication factors.
Layered Security
Use of different controls at different points in a transaction process.
Something a Person Is
Name the authentication factor represented by a biometric characteristic, such as a fingerprint or iris pattern.
Something a Person Knows
Name the authentication factor represented by a password or PIN.
Something a Person Has
Name the authentication factor represented by an ATM/debit card, smart card or token.
Out-of-Wallet Questions
Challenge questions that do not rely on information that is publicly available.
Device Identification
Technique used to establish a “fingerprint identity” of a user’s computer or other web access device.
Complex Device Identification
Authentication technique that uses one-time cookies, PC configuration, IP address, geo-location and other factors.
Encryption
A data security technique that encodes information so that data appears as a meaningless string of letters and symbols during delivery or transmission.
Overwriting
Disposal technique used to destroy sensitive, electronic data on devices by replacing it with new, random data.
Degaussing
Disposal technique using powerful, varying magnetic fields to scramble data recorded on media.