Comprehensive Guide to Security Technologies: Access Controls, Firewalls, and VPNs

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

flashcard set

Earn XP

Description and Tags

These flashcards cover essential concepts, definitions, and technologies related to access control, firewalls, VPNs, and software development methodologies as essential topics in information security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Access Control

A critical component of information security responsible for selectively determining who may access specific resources and how.

2
New cards

Identification

The process of claiming an identity by providing a username or ID in an access control system.

3
New cards

Authentication

Verifying that the claimed identity is genuine, typically through passwords, biometrics, or tokens.

4
New cards

Authorization

Determining what actions or resources the authenticated subject can access.

5
New cards

Accountability

Tracking and monitoring user actions to ensure proper use and facilitate audits.

6
New cards

Mandatory Access Control (MAC)

Structured, policy-driven controls where access is governed by strict rules set by the system.

7
New cards

Discretionary Access Control (DAC)

Access controls that give data owners the discretion to set permissions on resources they own.

8
New cards

Biometric Authentication

A method that relies on measurable human traits, such as fingerprints or iris patterns, to verify identity.

9
New cards

Packet Filtering

A firewall processing mode that examines header information to permit or block packets.

10
New cards

Application Layer Proxy

A type of firewall that inspects higher-level protocols and acts as an intermediary.

11
New cards

VPN (Virtual Private Network)

A technology that enables secure, encrypted connections over public networks, extending organizational networks.

12
New cards

Kerberos

A network authentication protocol that uses tickets to allow nodes to prove their identity securely.

13
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

14
New cards

Stateful Inspection

A firewall technology that keeps track of active connections and allows only packets that belong to established sessions.

15
New cards

Security Information and Event Management (SIEM)

A system that aggregates and analyzes security event data from various sources in real time.

16
New cards

Digital Signature

A cryptographic technique used to verify the authenticity and integrity of a message.

17
New cards

Public Key Infrastructure (PKI)

An integrated framework that manages digital certificates and cryptographic keys to facilitate secure communications.

18
New cards

Diffie-Hellman

A method for securely exchanging cryptographic keys over a public channel.

19
New cards

Steganography

The practice of hiding messages within other digital data, such as images or audio files, to conceal their existence.

20
New cards

Agile Programming (AP)

An approach to software development that emphasizes flexibility, customer feedback, and incremental releases.

21
New cards

Work Breakdown Structure (WBS)

A hierarchical decomposition of a project into manageable tasks and sub-tasks.

22
New cards

Change Management

The process of managing the transition of individuals and organizations to a desired future state.