Identity & Access Management Flashcards Preview

Game Changer > Identity & Access Management > Flashcards

Flashcards in Identity & Access Management Deck (25):
1

An unified login experience when accessing one or more systems

Single Sign On (SSO)

2

Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested

Single Factor Authentication

3

A version of the SAML OASIS standard for exchanging authentication & authorization data between security domains

Security Assertion Markup Language 2.0 (SAML)

4

An access control model that based on a list of predefined rules that determine what accesses should be granted

Rule-Based Access Control

5

An access control model that bases the access control authorizations on the roles that the user is assigned within an organization

Role-Based Access Control

6

A non-contact, automatic identification technology that uses radio signals to identify, track, sort and detect a variety of objects including people, vehicles, goods, & assets without the need for direct contact

Radio Frequency Identification (RFID)

7

Allows authorized security personnel to simultaneously manage & monitor multiple entry points from a single centralized location

Physical Access Control Systems (PACS)

8

A system that manages passwords consistently across the enterprise

Password Management System

9

Ensures that a user is who they claim to be. The more factors used to determine a person's identity, the greater the trust of authenticity

Multi-Factor Authentication

10

Access Control that requires the system itself to manage access controls in accordance with the organization's security policies

Mandatory Access Control (MAC)

11

A 48-bit number that is supposed to be globally unique

MAC Address

12

Protection mechanisms that limit user's access to information & restrict their forms of access on the system to only what is appropriate for them

Logical Access Controls

13

Developing standard for authenticating network users. Offers two key benefits: Functions in a multi-vendor network, & it does not transmit passwords over the network

Kerberos

14

Process of collecting & verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be, & establishing a reliable relationship

Identity Proofing

15

Cloud-based services that broker identity & access management functions to target systems on customer's premises and/or in the cloud

Identity as a Service (IDaaS)

16

Protects enterprise assets & provides a history of who gained access & when the access was granted

Facility Access Control

17

The process of establishing confidence in user identities electronically presented to an information system

Electronic Authentication

18

A hardware device that contains non-programmable logic & non-volatile storage dedicated to all cryptographic operations & protection of private keys

Cryptographic Device

19

Process of defining the specific resources a user needs & determining the type of access to those resources the user may have

Authorization

20

Process of verifying the identity of the user

Authentication

21

Systems that attempt to streamline the administration of user identity across multiple systems

Account Management Systems

22

Physical or electronic systems designed to control who, or what, has access to a network

Access Control Systems

23

Used to enter secured areas of a facility & are used in conjunction with a badge reader to read information stored on the badge

Access Badge

24

Provides the system with a way of uniquely identifying a particular user among all the users of that system

User ID

25

A local hardware encryption engine & secured storage for encryption keys

Trusted Platform Module