1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Identification
Process of asserting a identity and having it confirmed
Authentication
Process of validating that the identity being claimed by a user or entity is known to a system
Authorization
The process of granting or denying specific requests
Non-repudiation
Process of sender denying his action
Business Impact Analysis (BIA)
is a technique for analyzing how disruptions can affect an organization, and has the primary objective of identifying and prioritizing critical business processes
Business Continuity Plan (BCP)
is a pre-determined set of instructions describing how the mission/business processes of an organization will be sustained during and after a significant disruption.
Confidentiality
guarantees that information is accessible only to those authorized to access it
Side Channel Attacks
non-invasive attacks that extract information from devices (typically devices running cryptographic algorithms)
Sensitivity
is the importance assigned to information by its owner, or the purpose of representing its need for protection
DMZ is not a
quarantine area used to temporarily isolate devices
Bell and LaPadula access control model is a form of
MAC
Rootkit
provides privileged access (root access in Unix/Linux platforms) to a computer while hiding its presence
Separation of Duties
aims primarily at fraud detection