• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
What is CIA?

Confidentiality, Integrity, and Availability
Confidentiality refers to the idea that?
Information should only be accessible to its intended recipients
Integrity is the idea that?

Information should arrive at a destination as it was sent
Availability refers to?

the idea that information should be available to those authorized to use it
Security Lvl Type I

What you know- Access control methods to "what you know" include passwords, numeric keys, PIN numbers, secret questions and answers.
Security lvl Type II


what you have, physical keys or cards, smarts cards and other devices

Security Type III


what you are, some high tech systems may use fingerprints, retinal scans, or even DNA.



there are essentially three steps to any access control process


1. Identification: who is the user


2. Authentication: is the user who he says he is


3. Authorization: what does the user have permission to do

What is Kerberos?

an open source and widely accepted method of authentication that works on a shared secret key system with a trusted third party
The system in which a central administrator or admin dictates all of the access to information in a network or system

MAC: mandatory access control