Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
11 Cards in this Set
- Front
- Back
An access control system that grants access to information based upon its classification and the clearance of the individual is know as?
|
Mandatory Access Control - based upon the uses clearance level, the classification of the information, and the users need to know.
|
|
An Access control system that grants access based upon the identity of the user is known as?
|
Identy Based Access control - used to grant access to information based upon the identity of the person requesting the access.
|
|
An access control system that grants access to information based upon its classification and the clearance of the individual is know as?
|
Mandatory Access Control - based upon the uses clearance level, the classification of the information, and the users need to know.
|
|
An Access control system that grants access based upon the identity of the user is known as?
|
Identy Based Access control - used to grant access to information based upon the identity of the person requesting the access.
|
|
In reference to Biometric systems what is the Throughput Rate?
|
The number of end users that a biometric system can process within a stated time interval.
|
|
Define a Vulnerability?
|
A software or hardware or procedural weakness that may provide an attacker the open door he is looking for to enter a computewr or network and have authorized access to resources within the environment.
|
|
Define a Threat?
|
Any potential danger to nformation or systems
|
|
Waht is a threat Agent?
|
The entity that takes advantage of a vulnerability.
|
|
What is Risk?
|
A risk is the likihood of a threat agent taking advantage of a vulnerability and the corresponding business impact.
|
|
What is an exposure?
|
An instance of being exposed to losses from a threat agent.
|
|
What is a safegaurd or a countermeasure?
|
Something put in place to nitigate risk.
|