This CIA principle ensures that only authorized individuals can access information.
What is Confidentiality?
This access control model is commonly used in military
What is Mandatory Access Control (MAC)?
social engineering via email or messages.
What is Phishing?
this protocol allows users to authenticate once and gain access to multiple applications
What is Single Sign-On (SSO)?
These hackers exploit vulnerabilities for personal gain
What is a Black Hat Hacker?
This authentication protocol uses a ticket-granting system
What is Kerberos?
social engineering over the phone
What is Vishing (Voice Phishing)?
SAML's XML-based document to exchange authentication
What is a SAML Assertion?
phishing that uses SMS messages
What is Smishing (SMS Phishing)?
biometric error that allows unauthorized access
What is False Acceptance Rate (FAR)?