Java Games: Flashcards, matching, concentration, and word search.

Computer Security Chapter 3

AB
Access controlcombines authentication and authorization
authenticationproves users idenity
authorizationgranting users access
CIA elementsconfidentiality, integrity,availability
share-based access controlsame as password-based control
access based on user identityuser- based identity
depends on workstation being usedlocation based identity
Interoperabilityability of objects to interact with each other
authenticitydetermines trustworthiness
synergisticsingle control manages many objects
Discretionary control (DAC)uses ACLs to define access
Mandatory access Control (MAC)uses sensitivity labels and need to know
Role-based (RBAC)uses work task list
Kerberosauthentication mechanism that encrypts logon credentials
Internet Protocol Security (IPSec)used to encrypt transmissions, sessions and network traffic
Single-factor authenticationweakest form of authentication
Tojan horse,key loggers, shoulder surfingcan capture passwords
impersonationlogging on with someone elses password
easy to remember, difficult to guessgood password
biggest drawback in strong passwordsusers write down password
enrollmentrequired for biometric authorization
Crossover ratemeasure of reliability using rate of false rejections and acceptace
acceptancehow users feel about biometric device
capabilityability of users to use device
tokendevice issued to user for login
drawback of tokensdifficult to deploy and expensive, may run out of battery
drawback of biometricsmay not be acceptable to users, can be spoofed by photo, gelatin, etc.
drawback of passwordsimpersonation
strongest authenticationuse of more than one factor
ticket grantinggives users use (Kerberos)
Key Distributionauthentication (Kerberos)
RADIUSallows users to authenticate to remote servres
Realmorganization boundry
RTGSgrants tickets for remote realms
CHAPprotocol that authenticates remote clients or routers, periodic reauthorization
MD5hash function


Medina County Career Center

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities