Shared Flashcard Set

Details

CISSP Domain 5 2017
Domain 5
25
Other
Not Applicable
04/09/2017

Additional Other Flashcards

 


 

Cards

Term
Used to enter secured areas of a facility and are used in conjunction with a badge reader to read information stored on the badge
Definition
Access badges
Term
Physical or electronic systems designed to control who, or what, has access to a network
Definition
Access Control Systems
Term
Systems that attempt to streamline the administration of user identity across multiple systems
Definition
Account management systems
Term
The process of verifying the identity of the user
Definition
Authentication
Term
The process of defining the specific resources a user needs and determining the type of access to those resources the user may have
Definition
Authorization
Term
A hardware device that contains non-programmable logic and non-volatile storage dedicated to all cryptographic operations and protection of private keys.
Definition
Cryptographic Device
Term
The process of establishing confidence in user identities electronically presented to an information system
Definition
Electronic authentication (e-authentication)
Term
Protects enterprise assets and provides a history of who gained access and when the access was granted
Definition
Facility access control
Term
Cloud-based services that broker identity and access management functions to target systems on customers' premises and/or in the cloud
Definition
Identity as a Service (IDaaS)
Term
The process of collecting and verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be, and establishing a reliable relationsh
Definition
Identity proofing
Term
Developing standard for authenticating network users. Kerberos offers two key benefits: it functions in a multi-vendor network, and it does not transmit passwords over the network.
Definition
Kerberos
Term
Protection mechanisms that limit users' access to information and restrict their forms of access on the system to only what is appropriate for them
Definition
Logical access controls
Term
A 48-bit number (typically represented in hexadecimal format) that is supposed to be globally unique
Definition
MAC address
Term
Access control that requires the system itself to manage access controls in accordance with the organization's security policies
Definition
Mandatory Access Controls (MACs)
Term
Ensures that a user is who they claim to be. The more factors used to determine a person's identity, the greater the trust of authenticity
Definition
Multi-factor Authentication
Term
A system that manages passwords consistently across the enterprise
Definition
Password Management System
Term
Allows authorized security personnel to simultaneously manage and monitor multiple entry points from a single, centralized location
Definition
Physical Access Control Systems (PACS)
Term
A non-contact, automatic identification technology that uses radio signals to identify, track, sort and detect a variety of objects including people, vehicles, goods and assets without the need for direct contact
Definition
Radio Frequency Identification (RFID)
Term
An access control model that bases the access control authorizations on the roles (or functions) that the user is assigned within an organization
Definition
Role-Based Access Control (RBAC)
Term
An access control model that based on a list of predefined rules that determine what accesses should be granted
Definition
Rule-Based Access Control
Term
A version of the SAML OASIS standard for exchanging authentication and authorization data between security domains
Definition
Security Assertion Markup Language 2.0 (SAML 2.0)
Term
Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested
Definition
Single factor authentication
Term
A unified login experience (from the viewpoint of the end user) when accessing one or more systems
Definition
Single Sign-On (SSO)
Term
A local hardware encryption engine and secured storage for encryption keys
Definition
Trusted Platform Modules (TPM)
Term
Provides the system with a way of uniquely identifying a particular user amongst all the users of that system
Definition
User ID
Supporting users have an ad free experience!