click below
click below
Normal Size Small Size show me how
Security+ AAA
Security+ Flash Cards - AAA terms
| Term | Definition | Explanation |
|---|---|---|
| AAA | "Authentication, Authorization and Accounting" | |
| ABAC | Attribute-based Access Control | |
| CAPTCHA | Completely Automated Public Turing test to tell Computers and Humans Apart | |
| CER (1) | Cross-over Error Rate | Cross-over Error Rate = Where the false acceptance rate and false rejection rate are equal. |
| DAC | Discretionary Access Control | |
| FAR | FALSE Acceptance Rate | |
| FRR | FALSE Rejection Rate | |
| HOTP | HMAC-based One-Time Password | HMAC-based One-time Password algorithm (HOTP) is a one-time password (OTP) algorithm based on hash-based message authentication codes (HMAC). It is a cornerstone of the Initiative for Open Authentication (OAuth). |
| ID | Identification | |
| IdP | Identity Provider | "An identity provider (IdP) is a service that stores and verifies user identity. IdPs are typically cloud-hosted services, and they often work with single sign-on (SSO) providers to authenticate users." |
| MAC (2) | Mandatory Access Control | |
| MFA | Multi-Factor Authentication | |
| NGAC | Next Generation Access Control | |
| OAUTH | Open Authorization | "OAuth is an open protocol to allow secure authorization in a simple and standard method from web, mobile and desktop applications without sharing the initial logon credential. " |
| PAM | Pluggable Authentication Modules | A mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API). |
| RADIUS | Remote Authentication Dial-in User Server | |
| RBAC | Role-based Access Control or Rule-based Access Control | |
| SAML | Security Assertions Markup Language | "SAML is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. Primarily used for web browser single sign-on " |
| SPF | Sender Policy Framework | Email authentication method designed to detect the forging of sender addresses during the delivery of the email. |
| SSO | Single Sign-on | |
| TACACS+ | Terminal Access Controller Access Control System Plus | |
| TOTP | Time-based One-time Password | |
| Type 1 Authentication | Something you know | |
| Type 2 Authentication | Something you have | |
| Type 3 Authentication | Something you are |