Information Security: Principles and Practices, 2 Edition
Information Security: Principles and Practices, 2 Edition
Terms
Identification Discretionary access control
Authentication Access control lists
Least privilege User provisioning
Information owner
Mandatory access control
Role-based access control
Identification
Identification credentials uniquely identify the
users of an information system
Examples: name, initials, email address, or a
meaningless string of characters, Social Security
number, IDs, and others
Multifactor Authentication
Using more than one authentication mechanism
With two or three factors (multifactor
authentication) to authenticate, an information
owner can have confidence that users who
access their systems are indeed authorized
This is accomplished by adding more controls
and/or devices to the password authentication
process
Three-Factor Authentication
In a three-factor system, unique information related to the
user is added to the two-factor authentication process
This unique information may be a biometric (fingerprint,
retinal scan, and so forth) needed for authentication
Federated Identities
Facebook