Chapter 7- Information Security

Business AIS

47 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
Time-based model of security
Focuses on the relationship between preventative, detective, and corrective controls
Defense in depth
To employ multiple layers of controls in order to avoid having a single point of failure
Authentication
Focusses on verifying the identity of the person or device attempting to access the system
Biometric identifier
Users authenticated by verifying some physical characteristic
Multifactor authentication
The use of two or all three methods in conjunction
Authorization
Restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform
Access control matrix
A table specifying which portions of the system users are permitted to access and what actions they can perform
Compatibility test
Matches the user's authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action
Social engineering
Uses deception to obtain unauthorized access to info resources (tricks)
Border router
Connects an orgs info system to the internet
Firewall
Behind the border router
special purpose hardware device or software running on a general purpose computer
Demilitarized zone (DMZ)
Separate network that permits controlled access from the internet to selected resources
Transmission Control Protocol (TCP)
Specifies the procedures for dividing files and documents into packets to be sent over the internet and the methods for reassembly of the original document or file at the destination
Internet protocol (IP)
Specifies the structure of those packets and how to route them to the proper destination.
Routers
Special purpose devices designed to read the destination address fields in IP packet headers to decided where to send (route) the packet next