Chapter 9 Flashcards
identity proofing
An initial validation of an identity.
closed-circuit television (CCTV)
A video system (often used for surveillance) that
makes use of traditional coaxial-based video components, but is used privately, within a
building or campus.
security tokens
Physical devices given to authorized users to help with authentication.
These devices might be attached to a keychain or are part of a card system.
federated identity management (FIM)
When a user’s identity is shared across multiple
identity management systems.
false negative
When a system denies a user who actually should be allowed access to
the system
false positive
When a system authenticates a user who should not be allowed access to
the system
802.1X
An authentication technology used to connect devices to a LAN or
WLAN.
Extensible Authentication Protocol (EAP)
Not an authentication mechanism in itself
but instead defi nes message formats.
Protected Extensible Authentication Protocol (PEAP)
Protocol used to encapsulate
EAP packets within encrypted and authenticated tunnels.
Lightweight Directory Access Protocol (LDAP)
An Application Layer protocol used for
accessing and modifying directory services data.
Kerberos
An authentication protocol that enables computers to prove their identity to
each other in a secure manner.
tickets
used by Kerberos.
Challenge Handshake Authentication Protocol (CHAP)
An authentication scheme used
by the Point-to-Point Protocol (PPP) that is the standard for dial-up connections.
Point-to-Point Tunneling Protocol (PPTP)
A tunneling protocol used to support VPNs.
Layer 2 Tunneling Protocol (L2TP)
A tunneling protocol used to connect virtual private
networks.