Technological Innovation in Cyber Security Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary and concepts from the lecture notes on Technological Innovation in Cyber Security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Authentication

The process of identifying users that request access to a system, network, or device.

2
New cards

Access Control

Governs how users and systems interact with resources by managing permissions and ensuring only authorized entities can access or modify information.

3
New cards

Cyber Security Services

Protect an organization’s and/or individual’s information, devices, and networks from cyber threats.

4
New cards

Graphical Password Authentication

A method of user authentication that uses images instead of text; users click on images instead of typing a password.

5
New cards

Access Right

Describes the way in which a subject may access an object, such as read, write, execute, delete, create, and search.

6
New cards

Subject (Access Control)

An entity that is capable of accessing objects, such as users and applications.

7
New cards

Object (Access Control)

A resource to which access is controlled, such as files and programs.

8
New cards

Passwordless Authentication

Authentication method that doesn't require a password. Often uses biometrics, hardware tokens, OTP, SMS or Email.

9
New cards

Social Login

A method of authentication that allows a person to log into a third-party website using their existing social media accounts.

10
New cards

Single Sign-On (SSO)

An authentication process that allows a person to access multiple applications or systems with a single set of credentials.

11
New cards

Adaptive Authentication

A security approach that dynamically adjusts the authentication process based on the context and risk level of each login attempt.

12
New cards

Zero Trust Authentication

Operates on the principle that no user or device, whether inside or outside the network, should be trusted by default.