Preview

Nt1330 Unit 1 Study Guide

Good Essays
Open Document
Open Document
508 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 1 Study Guide
Question 1 the four means of authenticating user identity are based on:
• SOMETHING THE INDIVIDUAL KNOWS - password, PIN, answers to prearranged questions
• SOMETHING THE INDIVIDUAL POSSESS (TOKEN)- smartcard, electronic keycard, physical key
• SOMETHING THE INDIVIDUAL IS (STATIC BIOMETRIC) – fingerprint, retina, face
• SOMETHING THE INDIVIDUAL DOES (DYNAMIC BIOMETRIC) - voice pattern, handwriting, typing rhythm
One technique is to restrict access to the password file using standard access control measures. Another technique is to force users to select passwords that are difficult to guess.

Question 2 * One-way function: The system stores only the value of a function based on the user's password.When the user presents a password, the system transforms that password and compares it with the stored value. In practice, the system usually performs a one-way transformation (not reversible) in which the password is used to generate a key for the one-way function and in which a fixed-length output is produced.

* Access control: Access to the password file is limited to one or a very few accounts. 2.
…show more content…
Role-based access control (RBAC) is an access policy determined by the system, not the owner. RBAC is used in commercial applications and also in military systems, where multi-level security requirements may also exist. RBAC differs from DAC in that DAC allows users to control access to their resources, while in RBAC, access is controlled at the system level, outside of the user's control. Although RBAC is non-discretionary, it can be distinguished from MAC primarily in the way permissions are handled. MAC controls read and write permissions based on a user's clearance level and additional labels. RBAC controls collections of permissions that may include complex operations such as an e-commerce transaction, or may be as simple as read or write. A role in RBAC can be viewed as a set of

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3 Summary

    • 734 Words
    • 3 Pages

    Although Zigbee implements a wide assortment of security measures, there are still a variety of vulnerabilities and attack methods that can be used. These attacks and how they can be carried out will be described in this Section.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Unit 7 Study Guide

    • 331 Words
    • 2 Pages

    What was the first popular packet switching WAN protocol and what type of circuits did it use?…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users.…

    • 287 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric element, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Better Essays

    itt security final paper

    • 1085 Words
    • 5 Pages

    A password by definition is, a secret word or phrase known only to a restricted group. Make sure users are not physically displaying passwords on the monitor or anywhere an unauthorized user can find it. If an unauthorized user finds a password, that person is held personally responsible. Be sure to enforce strong passwords…

    • 1085 Words
    • 5 Pages
    Better Essays
  • Good Essays

    SQLserverSecurity

    • 393 Words
    • 3 Pages

    9. At the bottom of the dialog box under default database select the database to password.…

    • 393 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week2 lab 1

    • 494 Words
    • 2 Pages

    Login .defs file , Allows you to change the password/ account requirements for each user. It contains how long a password could be used, the minimum days allowed between password changes, how long the password can be, and the number of days you will be warned before the password expires.…

    • 494 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Linux Interview Questions

    • 10428 Words
    • 42 Pages

    7. What does a plus at the beginning of a line in the password file signify?…

    • 10428 Words
    • 42 Pages
    Powerful Essays
  • Powerful Essays

    We’re secure! We use passwords!” How many of us have heard this claim? Or even – “We’re secure! We have a password policy!” Use a password or to calculate the world today, the password policy is not enough. To set a password in most cases the first line of defence, and much more. “A recent survey by Rainbow Technologies Inc. indicates that the use of insecure passwords can be costly -- and potentially risky -- for corporate data.”[Rosencrance] This paper focuses on the use of passwords and password policy good aspects and bad aspects, set of defined passwords according to password polices scenario that arise…

    • 2513 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    In this lab, you used group policy objects to create a minimum password length password policy and link it…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lock Tool

    • 564 Words
    • 3 Pages

    Before you get started you need to create a folder that will house your password protected folder, this is just an ordinary folder and can be located anywhere and named anything.…

    • 564 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security

    • 466 Words
    • 2 Pages

    Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training. The password policy may either be advisory or mandated by technical means. Some governments have national authentication frameworks[1] that define requirements for user authentication to government services, including requirements for passwords.…

    • 466 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Internet

    • 2383 Words
    • 10 Pages

    Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and privacy and may present security concerns if leak…

    • 2383 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Perhaps a business has a system that will support 5,000 users, however only 4,990 users are granted permissions to access one particular file. In order to grant access to 4,990 users, restricted authority is given. This will ensure that only the file needed is available to specific users and will help protect other data and system information from being accessed without permission. If restrictions are not implemented this could cause security issues, and breach of information, could diminish the integrity of the business. In some systems a security policy may be imposed to users whom have rights to access particular files, as well as specific classification to own those rights. (Low, Marie 1993)…

    • 678 Words
    • 2 Pages
    Good Essays