A+ GRADED. Buy Quality Materials!
Accountability or non-repudiation
the ability of a system to confirm that a sender cannot convincingly deny having sent
something.
Authentication
the ability of a system to confirm the identity of a sender - the person is who they say
they are. This ability should be reliable. This has three qualities, namely something the
user knows (password or personal identification number - PIN), something the user is
(biometrics) and something the user has (badge or driving licence).
Availability
the ability of a system to ensure that an asset can be used by any authorised parties. It
applies to both data and to services.
Biometrics
biological properties, based on some physical characteristic of the human body such as
a fingerprint, retina and iris, or voice. Are costly, can become a single point of failure
and can also have false readings.
Confidentiality
the ability of a system to ensure that an asset is viewed only by authorised parties
Controls
prevent threats from exercising vulnerabilities. There are various ways that harm can be
dealt with such as to prevent, deter, deflect, mitigate, detect and recover from its effects.
Decryption
the reverse process of transforming an encrypted message back into its normal, original
form.
Encryption
the process of encoding a message so that its meaning is not obvious.
Federated identity management
scheme is a union of separate identification and authentication systems. Instead of
maintaining separate user profiles, a federated scheme maintains one profile with one
authentication method.
Guard firewall
s a sophisticated firewall. Like a proxy firewall, it receives protocol data units, interprets
them, and emits the same or different protocol data units that achieve either the same
result or a modified result.