Term
|
Definition
Rights given to access services or applcations in access control. |
|
|
Term
|
Definition
The process by which resources are granted or denied. |
|
|
Term
access control list (ACL) |
|
Definition
A set of permissions that is attached to an object. |
|
|
Term
|
Definition
A model that provides a predefined framework for hardware and software developers who need to implement access control functionality in their devices or applications. |
|
|
Term
|
Definition
A 32 bit value in a Windows access control entry that specifies the rights that are allowed or denied and is also used to request access rights. |
|
|
Term
|
Definition
The process of setting a user's account to expire on a set date or based on inactivity. |
|
|
Term
|
Definition
Radio frequency identification tags that have their own power source and have longer ranges and larger memories than passive RFID tags. |
|
|
Term
|
Definition
crthsng that a user's credentials are genuine and not fabricated. |
|
|
Term
|
Definition
Granting permission to log on to a system based on identification and authentication (presenting valid credentials). |
|
|
Term
|
Definition
Another name for Rule Based Access Control (RBAC). |
|
|
Term
|
Definition
An attack on a password that repeatedly tries to re-create it through a random combination of characters. |
|
|
Term
|
Definition
combonation locks that use buttons that must be pushed in the proper sequence to open the door. |
|
|
Term
closed circuIt television (CCTV) |
|
Definition
A technology for using video cameras to transmit a signal to a specific and limited set of receivers for security. |
|
|
Term
|
Definition
A locl that extends a solid metal bar into the door frame for extra security. |
|
|
Term
|
Definition
An attack on a password that creates hashes of common dictionary words, and then compares those hashed dictionary words against those in the password file. |
|
|
Term
Discretionary Access Control (DAC) |
|
Definition
An access control model in which the subject has total control over any objects that the subject owns along with the programs that are associated with those objects. |
|
|
Term
Group Policy Objects (GPOs) |
|
Definition
The location where Group Policy settings are stored. |
|
|
Term
|
Definition
An identification badge that can be visually screened by security guards or verified by a magnetic strip or barcode identifier. |
|
|
Term
|
Definition
the presentation of credentials or identifying data when logging on to a system. |
|
|
Term
|
Definition
An access control principle thit maintnsns that if a condition is not explicitly met then it is to be rejected. |
|
|
Term
|
Definition
The process of periodically moving individuals from one job responsibility to another. |
|
|
Term
|
Definition
Another name for a preset lock. |
|
|
Term
KVM (keyboard, video mouse) switch |
|
Definition
A device that can be used to connect multiple computers to a single monitor, mouse, and keyboard. |
|
|
Term
|
Definition
An access control principle that maintains that each user should be given the minimal amount of privileges necessary for that person to perform his or her job function. |
|
|
Term
|
Definition
A legacy format for storing Windows passwords that is considered very weak. |
|
|
Term
|
Definition
A group policy that is used to configure settings for systems that are not part of an Active Directory. |
|
|
Term
Mandatory Access Control (MAC) |
|
Definition
An access control model in which the end user cannot implement, modify, or transfer any controls. |
|
|
Term
|
Definition
A security device that monitors and controls two interlocking doors to a small room that separates a nonsecured area from a secured area. |
|
|
Term
Non-Discretionary Access Control |
|
Definition
Another name for Role Based Access Control. |
|
|
Term
NTLM (New Technology LAN Manager) hash |
|
Definition
A more secure format for storing Windows passwords that is considered very strong. |
|
|
Term
|
Definition
A specific resource, such as a file or a hardware device. |
|
|
Term
|
Definition
An action that is taken by the subject over an object. |
|
|
Term
|
Definition
Radio frequency identification tags do not have their own power supply. |
|
|
Term
|
Definition
A record or list of individuals who entered a secure area, the time that they entered, and the time they left the area. |
|
|
Term
|
Definition
A lock that requires only a key for unlocking the door front the outside.. |
|
|
Term
|
Definition
Servers that are stored in a rack and can be stacked with up to 50 other servers in a closely confined area. |
|
|
Term
radio frequency identification (RFID) tag |
|
Definition
A tag that can be easily affixed to the inside of an ID badge and can be read by an RFID transceiver. |
|
|
Term
|
Definition
An attack on a password that uses a large pregenerated data set of hashes from nearly every possible password. |
|
|
Term
|
Definition
A Microsoft Windows database that stores settings and options for the operating system. |
|
|
Term
Role Based Access Control rnBAC) |
|
Definition
An access control model that is based on a user's job function within the organization. |
|
|
Term
Rule Based Access Control (RBAC) |
|
Definition
An access control model that can dynamically assign roles to subjects based on a set of rules defined by a custodian. |
|
|
Term
Rule-Based Role-Based Access control (RB-RBAC) |
|
Definition
Another name for Rule Based Access Control (RBAC). |
|
|
Term
|
Definition
A random sequence of bits input along with the user-created password to protect it from attack. |
|
|
Term
security identifier (SID) |
|
Definition
An entry in Windows access control that is a unique number issued to the user for security. |
|
|
Term
|
Definition
A security provision that requires a process to be divided between two or more individuals. |
|
|
Term
|
Definition
A user or a process functioning on behalf of the user who attempts to access an object. |
|
|
Term
|
Definition
A door security device that contains multiple infrared beams aimed across a doorway. |
|
|
Term
|
Definition
Limitations placed on when a user can log on to a system. |
|
|
Term
User Account Control (UAC) |
|
Definition
A Microsoft Windows Vista feature that provides enhanced security by prompting the user for permission whenever software is installed. |
|
|