Authentication happens when a system validates a user's credentials., Multi-factor authentication is more secure than single-factor., A smart card contains embedded technologies that are part of MFA., Security tokens display an access code that changes every 30 seconds., Biometric devices scan fingerprints or retinas to provide foolproof authentication., Single sign on gives access to multiple accounts or applications., Least privilege provides the minimum amount of privileges necessary to work., Mandatory Access Control is the most restrictive control model., Discretionary Access Control is common in workgroup settings., An Access Control List describes who has access and what their level is., Role-based and rule-based are two systems of access control., Accounting and logs keep track of actions within a system., Web browsing history provides a record of all the sites visited on a specific device., Nonrepudiation means providing evidence that a specific action occurred.,

Understanding Access Control (9.3)

vytvoril(a)

Rebríček

Vizuálny štýl

Možnosti

Prepnúť šablónu

Obnoviť automaticky uložené: ?