Term
|
Definition
the method by which systems determine whether and how to admit a user into a trusted area of the organization. |
|
|
Term
mandatory access controls (MAC) |
|
Definition
use data classification schemes; they give users and data owners limited control over access to information resources. |
|
|
Term
lattice-based access control |
|
Definition
users are assigned a matrix of authorizations for particular areas of access. |
|
|
Term
Access control list (ACL) |
|
Definition
the column of attributes associated with a particular object |
|
|
Term
non discretionary controls |
|
Definition
a strictly-enforced version of MACs that are managed by a central authority in the organization and can be based on an individual's role. |
|
|
Term
|
Definition
controls that are tied to the role a user performs in an organization |
|
|
Term
|
Definition
controls that are tied to a particular assignment or responsibility |
|
|
Term
Discretionary access controls (DACs) |
|
Definition
controls that are implemented at the discretion or option of the data user. |
|
|
Term
|
Definition
a mechanism whereby an unverified entity that seeks access to a resource proposes a label by which they are known to the system. |
|
|
Term
|
Definition
the process of validating a supplicant's purported identity |
|
|
Term
|
Definition
a private word or combination of characters that only the user should know |
|
|
Term
|
Definition
Something you know something you have something you are |
|
|
Term
|
Definition
a series of characters, typically longer than a password, from which a virtual password is derived. |
|
|
Term
|
Definition
ID cards or ATM cards with magnetic stripes containing the digital user PIN, against which the number a user input is compared. |
|
|
Term
|
Definition
contains computer chip that can verify and validate a number of pieces of information instead of just a PIN. |
|
|
Term
|
Definition
the process of using two different authentication mechanisms drawn from two different factors of authentication |
|
|
Term
|
Definition
the matching of an authenticated entity to a list of information assets and corresponding access levels. |
|
|
Term
|
Definition
an information security program is similar to a building's firewall in that it prevents specific types of information from moving between the outside world. |
|
|