What are the 4 steps taken to check a file for integrity?
A hash is created for the original file
then the hash is encrypted using the creator’s private key
the recipient decrypts the hash with the creator’s public key
then a hash function is performed on the received file to compare with the hash from the original file
AAA
Authentication, Authorization, and Accounting
PEP
Policy Enforcement Point
PA
Policy Administrator
PE
Policy Engine
What does the PE do?
Allow or Deny access based on conditions
What is the PEP?
the gatekeeper
What is the PA?
the creator/editor of policies