1/11
Flashcards covering key vocabulary and concepts from the lecture notes on Technological Innovation in Cyber Security.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Authentication
The process of identifying users that request access to a system, network, or device.
Access Control
Governs how users and systems interact with resources by managing permissions and ensuring only authorized entities can access or modify information.
Cyber Security Services
Protect an organization’s and/or individual’s information, devices, and networks from cyber threats.
Graphical Password Authentication
A method of user authentication that uses images instead of text; users click on images instead of typing a password.
Access Right
Describes the way in which a subject may access an object, such as read, write, execute, delete, create, and search.
Subject (Access Control)
An entity that is capable of accessing objects, such as users and applications.
Object (Access Control)
A resource to which access is controlled, such as files and programs.
Passwordless Authentication
Authentication method that doesn't require a password. Often uses biometrics, hardware tokens, OTP, SMS or Email.
Social Login
A method of authentication that allows a person to log into a third-party website using their existing social media accounts.
Single Sign-On (SSO)
An authentication process that allows a person to access multiple applications or systems with a single set of credentials.
Adaptive Authentication
A security approach that dynamically adjusts the authentication process based on the context and risk level of each login attempt.
Zero Trust Authentication
Operates on the principle that no user or device, whether inside or outside the network, should be trusted by default.