Front | Back |
Time-based model of security
|
Focuses on the relationship between preventative, detective, and corrective controls
|
Defense in depth
|
To employ multiple layers of controls in order to avoid having a single point of failure
|
Authentication
|
Focusses on verifying the identity of the person or device attempting to access the system
|
Biometric identifier
|
Users authenticated by verifying some physical characteristic
|
Multifactor authentication
|
The use of two or all three methods in conjunction
|
Authorization
|
Restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform
|
Access control matrix
|
A table specifying which portions of the system users are permitted to access and what actions they can perform
|
Compatibility test
|
Matches the user's authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action
|
Social engineering
|
Uses deception to obtain unauthorized access to info resources (tricks)
|
Border router
|
Connects an orgs info system to the internet
|
Firewall
|
Behind the border router
special purpose hardware device or software running on a general purpose computer |
Demilitarized zone (DMZ)
|
Separate network that permits controlled access from the internet to selected resources
|
Transmission Control Protocol (TCP)
|
Specifies the procedures for dividing files and documents into packets to be sent over the internet and the methods for reassembly of the original document or file at the destination
|
Internet protocol (IP)
|
Specifies the structure of those packets and how to route them to the proper destination.
|
Routers
|
Special purpose devices designed to read the destination address fields in IP packet headers to decided where to send (route) the packet next
|