Cybersecurity Access Control: AAA, MFA, Biometrics, and FIM

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

Authentication

It verifies the identity of each user, to prevent unauthorized access.

2
New cards

Authorization

It determines which resources users can access, along with the operations that users can perform.

3
New cards

Accounting

It keeps track of what users do — including what they access, the amount of time they access resources, and any changes they make.

4
New cards

Access Control List (ACL)

An ACL determines whether a user has certain access privileges once the user authenticates.

5
New cards

Two Factor Authentication

The system requires a combination of two of the following: something they know, something they have, or something they are.

6
New cards

Identification

It enforces the rules established by the authorization policy.

7
New cards

Unique Identifier

A unique identifier ensures the proper association between allowed activities and subjects.

8
New cards

Username

A username is the most common method used to identify a user.

9
New cards

Password

A string of characters used to prove a user's identity, which should be at least eight characters and contain a combination of upper and lowercase letters, numbers, and special characters.

10
New cards

Passphrase

A term generically referred to as a password, which can be a string of characters used to prove a user's identity.

11
New cards

Personal Identification Number (PIN)

An example of something that the user knows to prove their identity.

12
New cards

Smart Card

An example of something that the user has to prove their identity.

13
New cards

Biometric Authentication

Includes methods such as fingerprint, retina scan, or voice recognition to verify a user's identity.

14
New cards

Cybersecurity Accounting

Tracks and monitors user activities in real time and provides auditing results.

15
New cards

Computer Policies

System administrators can set up these policies to enable system auditing.

16
New cards

Access Control

The concept that involves managing who can access resources and what actions they can perform.

17
New cards

Unauthorized Access

Access to a computer, network, database, or other data resource that is not permitted.

18
New cards

Security Services

The three services involved in administrative access controls: authentication, authorization, and accounting (AAA).

19
New cards

Criminal Access

If a criminal cracks the user's password once, they will have access to all the user's accounts.

20
New cards

Access Request

Every time access to a resource is requested, the access controls determine whether to grant or deny access.

21
New cards

Alphanumeric Combination

A type of username that can include letters and numbers.

22
New cards

Character Combination

A password should contain a combination of upper and lowercase letters, numbers, and special characters.

23
New cards

Smart cards

A small plastic card, about the size of a credit card, with a small chip embedded in it that is capable of processing, storing, and safeguarding data.

24
New cards

Security key fob

A device that is small enough to attach to a keyring, often used for two-factor authentication (2FA).

25
New cards

Two-factor authentication (2FA)

A method of authentication that uses two different factors for verification, making it more secure than a username and password combination.

26
New cards

Biometric security

A method that compares unique physical characteristics against stored profiles to authenticate users.

27
New cards

Physiological characteristics

Biometric identifiers such as fingerprints, DNA, face, hands, retina, or ear features.

28
New cards

Behavioral characteristics

Biometric identifiers based on patterns of behavior such as gestures, voice, gait, or typing rhythm.

29
New cards

Biometrics

The use of unique physical or behavioral characteristics for authentication, increasingly popular in public security systems, consumer electronics, and point-of-sale applications.

30
New cards

Reader or scanning device

A device used in biometric systems to capture physical characteristics for authentication.

31
New cards

Strong password

A password that combines alphanumeric characters, symbols, and may include spaces.

32
New cards

Weak password

A password that is simple, dictionary-based, or easily guessable.

33
New cards

Federated Identity Management

A system that allows multiple enterprises to let their users use the same identification credentials to access networks across the group.

34
New cards

Cascading effect

The increased probability of a widespread impact from an attack due to interconnected systems.

35
New cards

Single sign-on

A user experience that allows access to multiple applications with one set of login credentials.

36
New cards

Identity thieves

Individuals who steal personal information to commit fraud.

37
New cards

Authorized device

A device that is permitted to access a user's identity information in federated identity management.

38
New cards

Multi-Factor Authentication

A security process that requires two or more methods of verification for access.

39
New cards

Fingerprint scan

A biometric method that uses a person's unique fingerprint for authentication.

40
New cards

Alphanumeric characters

Characters that include both letters and numbers.

41
New cards

Symbols

Special characters used in passwords to enhance security.

42
New cards

Social login credentials

Login information that allows users to access multiple websites using their social media accounts.

43
New cards

Identity management systems

Systems that manage user identities and credentials across different platforms.

44
New cards

Scanned information

Data captured by a biometric reader or scanning device for authentication purposes.

45
New cards

Database of biometric data

A storage system that holds biometric information for comparison during authentication.

46
New cards

Password and something you have

A common method of verification in multi-factor authentication.