Term
Used to enter secured areas of a facility and are used in conjunction with a badge reader to read information stored on the badge |
|
Definition
|
|
Term
Physical or electronic systems designed to control who, or what, has access to a network |
|
Definition
|
|
Term
Systems that attempt to streamline the administration of user identity across multiple systems |
|
Definition
Account management systems |
|
|
Term
The process of verifying the identity of the user |
|
Definition
|
|
Term
The process of defining the specific resources a user needs and determining the type of access to those resources the user may have |
|
Definition
|
|
Term
A hardware device that contains non-programmable logic and non-volatile storage dedicated to all cryptographic operations and protection of private keys. |
|
Definition
|
|
Term
The process of establishing confidence in user identities electronically presented to an information system |
|
Definition
Electronic authentication (e-authentication) |
|
|
Term
Protects enterprise assets and provides a history of who gained access and when the access was granted |
|
Definition
|
|
Term
Cloud-based services that broker identity and access management functions to target systems on customers' premises and/or in the cloud |
|
Definition
Identity as a Service (IDaaS) |
|
|
Term
The process of collecting and verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be, and establishing a reliable relationsh |
|
Definition
|
|
Term
Developing standard for authenticating network users. Kerberos offers two key benefits: it functions in a multi-vendor network, and it does not transmit passwords over the network. |
|
Definition
|
|
Term
Protection mechanisms that limit users' access to information and restrict their forms of access on the system to only what is appropriate for them |
|
Definition
|
|
Term
A 48-bit number (typically represented in hexadecimal format) that is supposed to be globally unique |
|
Definition
|
|
Term
Access control that requires the system itself to manage access controls in accordance with the organization's security policies |
|
Definition
Mandatory Access Controls (MACs) |
|
|
Term
Ensures that a user is who they claim to be. The more factors used to determine a person's identity, the greater the trust of authenticity |
|
Definition
Multi-factor Authentication |
|
|
Term
A system that manages passwords consistently across the enterprise |
|
Definition
Password Management System |
|
|
Term
Allows authorized security personnel to simultaneously manage and monitor multiple entry points from a single, centralized location |
|
Definition
Physical Access Control Systems (PACS) |
|
|
Term
A non-contact, automatic identification technology that uses radio signals to identify, track, sort and detect a variety of objects including people, vehicles, goods and assets without the need for direct contact |
|
Definition
Radio Frequency Identification (RFID) |
|
|
Term
An access control model that bases the access control authorizations on the roles (or functions) that the user is assigned within an organization |
|
Definition
Role-Based Access Control (RBAC) |
|
|
Term
An access control model that based on a list of predefined rules that determine what accesses should be granted |
|
Definition
Rule-Based Access Control |
|
|
Term
A version of the SAML OASIS standard for exchanging authentication and authorization data between security domains |
|
Definition
Security Assertion Markup Language 2.0 (SAML 2.0) |
|
|
Term
Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested |
|
Definition
Single factor authentication |
|
|
Term
A unified login experience (from the viewpoint of the end user) when accessing one or more systems |
|
Definition
|
|
Term
A local hardware encryption engine and secured storage for encryption keys |
|
Definition
Trusted Platform Modules (TPM) |
|
|
Term
Provides the system with a way of uniquely identifying a particular user amongst all the users of that system |
|
Definition
|
|