A method for determining who can access what resources. In most cases this is accomplished with an ACL (Access Control List)
Also refer to DAC
The place where access to a network is achieved. Refer to WAP.
Refer to Access Control.
One of two configurations created within wireless networks. Does not use a WAP (Wireless Access Point). Refer to WAP.
Used to provide connectionless integrity and did portion authentication for IP data grants, and to provide protection against replays". Refer to RFC 2402
Typically a mathematical formula created to generate results
Encryption using a public and private key. Contrast this to symmetric which uses only one key. In a symmetric encryption one key is used to encode data so it cannot be read, while the other key issues to decode the data. Refer to symmetric
Verifying someone is who they say they are. Refer to Authorization
Data or objects (printers) a user is authorized to access or use
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.