• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
access control:
The mechanism used in an information system to allow or restrict access to data or devices.
access control list (ACL):
A set of permissions that are attached to an object.
access control model:
A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access control list (ACL):
A set of permissions that are attached to an object.
account expiration:
The process of setting a users account to expire.
Discretionary Access Control (DAC):
The least restrictive access control model in which the owner of the object has total control over it.
Extended TACAS:
The second version of the Terminal Access Control Access Control System (TACAS) authentication service.
implicit deny:
Rejecting access unless a condition is explicitly met.
job rotation:
The act of moving individuals from one job responsibility to another.
An authentication system developed by the MIT and used to verify the identity of networked used.
least privilege:
Providing only the minimum amount of privileges necessary to perform a job or function.
LDAP injection attack:
An attack that constructs LDAP statements based on user input statements, allowing the attacker to retrieve information from the LDAP database or modify its content.
Lightweight Directory Access Protocol (LDAP):
A protocol for a client application to access an X.500 directory
Mandatory Access Control (MAC):
The most restrictive access control model typically found in military settings in which security is of supreme importance.
mandatory vacations:
Requiring that all employees take vacations.
Remote authentication Dial in User Service(RADIUS):
An industry standard authentication service with widespread support across nearly all vendors of networking equipment.
Role Based Access Control (RBAC):
A real world access control model in which access is based on a users job function within the organization.
Rule Based Access Control(RBAC):
An access control model that can dynamically assign roles to subjects based on a set of rules defined by a custodian.
separation of duties:
The practice of requiring that processes should be dived between two or more individuals.
The current version of the Terminal Access Control Access Control System (TACAS) authentication service.
Terminal Access Control Access Control System(TACAS):
An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server. The current version is TACAS+
time of day restrictions:
Limitations imposed as to when a user can log on to a system.