IS3230 ACCESS CONTROL, KEY INFRASTRUCTURE

This class was created by Brainscape user Barbara Crable. Visit their profile to learn more about the creator.

Decks in this class (15)

IS3230 CHAPTER 1
The ability of a subject and an o...,
The process or mechanism of grant...,
The process of confirming the ide...
31  cards
IS3230 CHAPTER 2
The number of times per year we c...,
The total cost per year of the th...,
The relative value either in mone...
47  cards
IS3230 CHAPTER 3
22  cards
IS3230 CHAPTER 4
This is a title in the code of fe...,
A documented met odd or system of...,
A us law passed in 2000 it requir...
30  cards
IS3230 CHAPTER 5
A confirmed event that compromise...,
Requires a business operating in ...,
A federal criminal statute design...
24  cards
IS3230 CHAPTER 6
The practice of keeping sensitive...,
An access control system where ri...
7  cards
IS3230 CHAPTER 7
An employee who is angry or dissa...,
The sum of qualities and traits s...,
The practice of dividing essentia...
19  cards
IS3230 CHAPTER 8
In window based systems a value t...,
This stores information about obj...,
A collection of binary data store...
39  cards
IS3230 CHAPTER 9
Short vertical posts designed to ...,
A unique number that identifies a...,
The point at which type i errors ...
29  cards
IS3230 CHAPTER 10
An element of the access control ...,
A list of security policies that ...,
Someone trying to compromise info...
41  cards
IS4550 CHAPTER 11
A process that performs a sequenc...,
Provides services for an applicat...,
Documenting rules procedures and ...
22  cards
IS3230 CHAPTER 12
As part of aaa this provides the ...,
An ipsec authentication protocol ...,
Network service that provide secu...
37  cards
IS3230 CHAPTER 13
The process of confirming the ide...,
An entity usually a trusted third...,
The certificate authorities list ...
25  cards
IS3230 CHAPTER 14
The use of software to control th...,
A hole in system or network secur...,
In a penetration test the ___ con...
38  cards
IS3230 CHAPTER 15
A series of events gleaned from p...,
A list of known malicious behavio...,
Occurs when an intrusion detectio...
22  cards

More about
IS3230 ACCESS CONTROL, KEY INFRASTRUCTURE

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Barbara Crable's IS3230 ACCESS CONTROL, KEY INFRASTRUCTURE flashcards for their ITT Tech - San Bernardino, CA class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Linux
  • 1 decks
  • 22 flashcards
  • 1 learners
Decks: Control Access To Files Ch7, And more!
Infrastructure Virtuelle II
  • 9 decks
  • 72 flashcards
  • 3 learners
Decks: Revision, Revision 2, Docker, And more!
QIHC maryjw79 @ gmail email 4 access
  • 16 decks
  • 1084 flashcards
  • 4 learners
Decks: General Immunology, Detection Systems, Specimen Handling, And more!
Make Flashcards