DNS BY Yousif Essam

Users are identified to a computer or an application through a user identifier or user-id.
Authentication
Access Control
Identification
Authorization
used to verify the identity of user. This verification requires the exchange of shared secrets between the user and the application.
Authentication
Access Control
Identification
Authorization
Process of giving access rights to each user ID. The access rights include specification, such as whether the user is permitted to read, write, or update a given file
Confidentiality
Access Control
Identification
Authorization
Process of enforcing access rights for network resources. Access control grants or denies permission to a given user for accessing a resource and protects resources by limiting access to only authenticated and authorized users
Confidentiality
Access Control
Identification
Authorization
Process used to protect secret information from unauthorized disclosure. Secret data needs to be protected when it is stored or when it is being transmitted over the network.
Confidentiality
Access Control
Identification
Authorization
allows detection of unauthorized modification of data
Confidentiality
Data Integrity
Identification
Authorization
Provide a proof of the origin of data or of the delivery of data. It protects against any attempt by the sender to falsely deny sending the data, or the recipient to falsely deny receiving the data
Confidentiality
Data Integrity
Identification
non-repudiation
service attack is one in which the attacker takes over or consumes a resource so that no one else can use it.
Confidentiality
Denial of Service
Identification
non-repudiation
0
{"name":"DNS BY Yousif Essam", "url":"https://www.quiz-maker.com/QXWZVOU72","txt":"Users are identified to a computer or an application through a user identifier or user-id., used to verify the identity of user. This verification requires the exchange of shared secrets between the user and the application., Process of giving access rights to each user ID. The access rights include specification, such as whether the user is permitted to read, write, or update a given file","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker