Authentication, authorization, and accounting Flashcards

1
Q

Access controls:

A

Security controls that manage access, authorization, and accountability of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application programming interface (API) token

A

A small block of encrypted code that contains information about a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric encryption:

A

The use of a public and private key pair for encryption and decryption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Algorithm:

A

A set of rules used to solve a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Basic auth

A

The technology used to establish a user’s request to access a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bit:

A

The smallest unit of data measurement on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brute force attack:

A

The trial and error process of discovering private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cipher:

A

An algorithm that encrypts information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptographic key:

A

A mechanism that decrypts ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptography:

A

The process of transforming information into a form that unintended readers can’t understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption:

A

The process of converting data from a readable format to an encoded format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data owner:

A

The person that decides who can access, edit, use, or destroy their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hash function:

A

An algorithm that produces a code that can’t be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data custodian:

A

Anyone or anything that’s responsible for the safe handling, transport, and storage of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital certificate:

A

A file that verifies the identity of a public key holder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hash collision:

A

An instance when different inputs produce the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity and access management (IAM):

A

A collection of processes and technologies that helps organizations manage digital identities in their environment

13
Q

Hash table:

A

A data structure that’s used to store and reference hash values

13
Q

Information privacy:

A

The protection of unauthorized access and distribution of data

14
Q

Non-repudiation:

A

The concept that the authenticity of information can’t be denied

15
Q

Multi-factor authentication (MFA):

A

A security measure that requires a user to verify their identity in two or more ways to access a system or network

15
Q

OAuth:

A

An open-standard authorization protocol that shares designated access between applications

16
Q

Payment Card Industry Data Security Standards (PCI DSS):

A

A set of security standards formed by major organizations in the financial industry

17
Q

Personally identifiable information (PII):

A

Any information used to infer an individual’s identity

17
Protected health information (PHI):
Information that relates to the past, present, or future physical or mental health or condition of an individual
17
Principle of least privilege:
The concept of granting only the minimal access and authorization required to complete a task or function
17
Public key infrastructure (PKI):
An encryption framework that secures the exchange of online information
18
Rainbow table:
A file of pre-generated hash values and their associated plaintext
19
Salting:
An additional safeguard that’s used to strengthen hash functions
20
Security assessment:
A check to determine how resilient current security implementations are against threats
21
Security audit:
A review of an organization's security controls, policies, and procedures against a set of expectations
22
Security controls
Safeguards designed to reduce specific security risks
23
Separation of duties
The principle that users should not be given levels of authorization that would allow them to misuse a system
24
Session ID:
A unique token that identifies a user and their device while accessing a system
24
Session:
A sequence of network HTTP basic auth requests and responses associated with the same user
24
Session cookie:
A token that websites use to validate a session and determine how long that session should last
25
Session hijacking:
An event when attackers obtain a legitimate user’s session ID
26
Single Sign-On (SSO):
A technology that combines several different logins into one
27
Symmetric encryption:
The use of a single secret key to exchange information
28
User provisioning:
The process of creating and maintaining a user's digital identity