1) Access Control List: This network access control determines which IP packets are allowed entry to a network and which are dropped.
2) Access Control Matrix: A table specifying which portions of the system users are permitted to access. Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate.
3) Authentication: Verifying the identity of the person or device attempting to access the system.
Multi-Factor: The use of two or more basic authentication methods.
Authentication Control: Meaningful Discussions is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits. As a consequence, the size of the information technology department has been growing very rapidly, with many new hires. Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility. This is an example of a(an)
Authentication Control: When new employees are hired by Folding Squid Technologies, they are assigned user names and appropriate permissions are entered into the information system's access control matrix.
4) Defense in Depth: Employ multiple layers of controls in oorder to avoid having a single point of failure
5) Firewall: A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system.
6) TCP/IP: The Transmission Control Protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet and the methods for reassembly of the original document or file at the destination. The Internet Protocol specifies the structure of those packets and how to route them to the proper destination.
7) Static Packet Filtering: Perform typically by border routers, the process which