In each blank, try to type in the
word that is missing. If you've
typed in the correct word, the
blank will turn green.
If your not sure what answer should be entered, press the space bar and the next missing letter will be displayed. When you are all done, you should look back over all your answers and review the ones in red. These ones in red are the ones which you needed help on. Term: AAA of Access Definition: -Authentication, Authorization, and Auditing
-Processes necessary for control Term: Definition: -Mandatory Access Control
-Access model Term: Definition: -Discretionary Control
-Access control model Term: Definition: -Role-Based Control
-Access control model Term: (RBAC)Definition: -Rule Set-Based Access Control
-Access model Term: FIMDefinition: -Federated Identity Management
-Lets use the same identification to access multiple enterprises' networks Term: SAMLDefinition: -Security Assertion Markup Language
-XML Term: DACLDefinition: -Discretionary Access Control List
-Type of access control Term: Definition: -Temporal Role-Based Control
-Subcategory of DAC
-Access control model Term: Definition: -Rule Set-Based Access Control -Type of access control list Term: Definition: -Access Control List
-Method of control Term: Definition: -Content Dependent Control
-Access control model Term: Definition: -Context-Based Control
-Access Control Model Term: CIA of Definition: -Confidentiality, , and Availability.
-Also includes Non-repudiation.
-The three main goals of security. |
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
khighfill1
Popular Computers sets