Component of Security
AAA
ISE Components
ISE Personas
ISE Features
100

The unifying attributes of an information security program.  Also, a national security organization in the US.

CIA

100

What AAA Stands for 

Authentication, Authorization and Accounting

100

A trusted server that can receive and respond to requests for network access, and can tell the authenticator if the connection is to be allowed, and various settings that should apply to that client's connection or setting

Authentication Server

100

It handles all system-related configurations that are related to functionality such as authentication, authorization, auditing, and so on.  Your school principal is this.

Admin Node

100

ISE may have a hot spot so users can use this feature.

Guest

200

Means ensuring timely and reliable access to, and use of, information

Availability

200

As the first process, this provides a way of identifying a user, typically by having the user enter a valid user name and valid password before access is granted.

Authentication

200

What ISE stands for?

Identity Services Engine

200

Functions as the log collector and stores log messages from all the administration and Policy Service nodes in your network.  ADT and CPI do this.

Monitoring Node

200

BYOD stands for...

Bring Your Own Device

300

Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation, accuracy, and authenticity

Integrity

300

Measures the resources a user consumes during access.  Also a possible career choice.

Accounting

300

A network device which provides a data link between the client and the network and can allow or block network traffic between the two

Authenticator

300

Provides network access, posture, guest access, client provisioning, and profiling services

Policy Service Node

300

Identifies the devices that connect to your network and their location.  Also, how someone looks from the side.

Profiling

400

Preserving authorized restrictions on access and disclosure, including a means for protecting personal privacy and proprietary information

Confidentiality

400

The process of enforcing policies: determining what types or qualities of activities, resources, or services a user is permitted.  Also, you wouldn't be allowed to enter Area 51 because of this.

Authorization

400

The software running on the client that provides credentials to the authenticator

Supplicant

400

Allows you to check the state, of all the endpoints that are connecting to a network for compliance with corporate security policies.  Also, how someone sits in their chair.

Posture

M
e
n
u