The unifying attributes of an information security program. Also, a national security organization in the US.
CIA
What AAA Stands for
Authentication, Authorization and Accounting
A trusted server that can receive and respond to requests for network access, and can tell the authenticator if the connection is to be allowed, and various settings that should apply to that client's connection or setting
Authentication Server
It handles all system-related configurations that are related to functionality such as authentication, authorization, auditing, and so on. Your school principal is this.
Admin Node
ISE may have a hot spot so users can use this feature.
Guest
Means ensuring timely and reliable access to, and use of, information
Availability
As the first process, this provides a way of identifying a user, typically by having the user enter a valid user name and valid password before access is granted.
Authentication
What ISE stands for?
Identity Services Engine
Functions as the log collector and stores log messages from all the administration and Policy Service nodes in your network. ADT and CPI do this.
Monitoring Node
BYOD stands for...
Bring Your Own Device
Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation, accuracy, and authenticity
Integrity
Measures the resources a user consumes during access. Also a possible career choice.
Accounting
A network device which provides a data link between the client and the network and can allow or block network traffic between the two
Authenticator
Provides network access, posture, guest access, client provisioning, and profiling services
Policy Service Node
Identifies the devices that connect to your network and their location. Also, how someone looks from the side.
Profiling
Preserving authorized restrictions on access and disclosure, including a means for protecting personal privacy and proprietary information
Confidentiality
The process of enforcing policies: determining what types or qualities of activities, resources, or services a user is permitted. Also, you wouldn't be allowed to enter Area 51 because of this.
Authorization
The software running on the client that provides credentials to the authenticator
Supplicant
Allows you to check the state, of all the endpoints that are connecting to a network for compliance with corporate security policies. Also, how someone sits in their chair.
Posture