Unauthorized Access and Use Flashcards
Involves using computers or networks without permission.
Unauthorized Access
Pertains to employing resources for unapproved or illegal activities.
Unauthotized Use
The use of a computer or its data for unapproved or possibly illegal activities
Unauthorized Use
Define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
Access Controls
Regulating who, when, and how resources can be accessed.
Access Controls
Logging successful and unsuccessful access attempts.
Audit Trails
The computer, device, or network should maintain an audit trail that records in a file both successful and unsuccessful access attempts
– User name
– Password
Authentication Methods: Basic credentials for verifying user identity.
Usernames and Passwords
Longer, complex password alternatives using words and punctuation.
Passphrases
A private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
Passphrase
Sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user
PIN
What is the full acronym name of PIN?
personal identification number
any item that you must possess, or carry with you, in order to gain access to a computer or computer facility
Possessed Object
It authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic
Biometric device
Utilizing unique physical traits (e.g., fingerprints) for authentication.
Biometric device