ConfidentialityIntegrityAvailabilityAuthenticationNew NIST Guidelines for Passwords - Should Do'sNew NIST Guidelines for Passwords - Should
... [Show More]
NOT Do's
Read-only memory (ROM)
Electrically erasable programmable ROM (EEPROM)
Random access memory (RAM)
Two-factor and Multifactor Authorization
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Subject
Object
Access right
12 protection bits
Sticky bit
Procedural Access Control Four main methods:
Separation of Duties
Job Rotation
Mandatory Vacation
Least Privilege
Active attack
Passive Attack
Symmetric key means...
Vigenère cipher (Vee-zha-nair)
Example
[Show Less]