Access
Privilege
Audit
Token
Authenticate
Public Key
100

This describes technical controls that govern how Users or other systems interact with a computing resource

Access Control System  p462

100

These are the four (4) processes in Account Control System

Identification, Authentication, Authorization & Accounting  p462

100

This Accounting Principle states a User cannot DENY having performed an action

Non Repudiation  p463

100

A password is this type of Authentication Factor

Something You Know  p465

100

These 2 hardware tokens contain a chip holding digital certificates

Smart Card or USB Fob  466

100

This is the solution to the problem of Authenticating subjects on public networks

Public Key Infrastructure (PKI)  p471

200

This describes a list of Subjects and the Permissions granted on an Object

Access Control List (ACL)  p462

200

This Firewall Rule states, "unless there is a Rule granting Access, the Request is DENIED"

Implicit DENY (Usually LAST Statement in ACL)  p462

200

Accounting is the process of establishing these and storing those events

 AUDIT Logs  p463

200

A smartcard is this type or Authentication Factor

Something You Have  p465

200

This hardware token generates a time sensitive code that expires in 60 seconds or less

RSA Token  p466

200

Public Key Cryptography relies on these 2 types of Keys  

Public & Private Keys  p471

300

This implies creating an account that identifies a User or Process

Identification  p462

300

This Rule states "User Only Granted Rights needed to perform their job - No More"

LEAST Privilege  p462

300

These devices can be used to record entry/egress to an area

Video Surveillance Cameras  p463

300

A fingerprint is this type or Authentication Factor

Something You Are  p465

300

These are generated by an application on the Users computer or Smartphone

Software Token (Microsoft Authenticator) p466

300

This element within PKI is responsible for issuing digital certificates

Certificate Authority  (CA)  p471

400

This describes proving a Subject is who or What they claim when attempting to access a Resource

Authentication  p462

400

This Access Model is based on Organizational job duties (Ex, Departmental)

ROLE Based Access (RBAC)  p463

400

These Access devices provide strong Authentication based on physical characteristics

Biometric Scanner  p464

400

This is a longer password comprising a number of words

Passphrase  p465

400

This Authentication method is also described as something you are

Biometrics  p467

400

This Algorithm function can Encrypt messages and passwords (MD5/SHA-2)

Cryptographic Hashing  p472

500

This determines what Rights or Permissions an Authenticated Subject has within a Resource

Authorization  p462

500

This Access Model is based on Security Clearances as found in Military or Government

MANDATORY Access Control (MAC)  p463

500

This physical or electronic token demonstrates a User requested and was issued a product or service

Receipt  p464

500

This authentication methods is a set of digits only you know

Personal Identification Number (PIN)  p465

500

These are a few other Biometrics beyond Fingerprints

Iris, Retina & Facial Recognition (Voice & "Gait" too)  p467

500

This is the process of connecting two Private Networks across an Public Network

Virtual Private Network (VPN)  p473

600

This is process of Logging Access & Permissions used to Resources

Accounting  p462

600

This Access Model is based on the Data Owner's "opinion"

DISCRETIONARY Access Control (DAC)  p463

600

These are the three (3) default categories of User Accounts created with Windows OS

Administrator, Guest & User (Standard)  p464

600

Tracing a shape by connecting dots constitutes this Authentication method

Pattern Lock  p465

600

This unique Location Authentication factor may be layered on other methods for increased security

Somewhere you are   p467

600

These Rules make Passwords difficult to Crack

Length, Complexity, Memorable, Confidential, History, Reuse  p474

700

This term refers to the resources being protected via Access Control System

Object  p462

700

This Access Control term refers to any model where Access is determined and enforced by Policies

Rule Based Access (RBAC & MAC)  p463

700

This Account allows Access without a password and is disabled by default

Guest  p464

700

This is the main shortcoming of Symmetric Encryption

Distribution & Storage of the KEY  p470

700

List 2 forms of Location Based Authentication (from the book)

GPS or IP Address  p467

700

This Password Crack works by repeated attempts to guess the answer (Time & Processing Power)

Brute Force  p473

M
e
n
u