Credentialing (information security)/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} {{TOC|right}} ==Parent topics== {{r|Information security}} {{r|Identification, authentication and credentialing}} ==Subtopics== {{r|Principle of Least Privilege}} {{r|Acc...) |
(No difference)
|
Revision as of 11:17, 6 May 2010
Credentialing (information security): Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified and authenticated; ideally follows the Principle of Least Privilege [e]
This article contains just a definition and optionally other subpages (such as a list of related articles), but no metadata. Create the metadata page if you want to expand this into a full article.
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Identification, authentication and credentialing [r]: Add brief definition or description
Subtopics
- Principle of Least Privilege [r]: A security principle that gives individuals only the special privileges needed to carry out a specific function; the default condition is that individuals do not have any privileges that were not explicitly granted. [e]
- Access control list [r]: Add brief definition or description
- Mandatory Access Control [r]: Add brief definition or description
- Kerberos [r]: A protocol using a central server to provide two clients with a shared session key, without either client having to publish a public key. [e]
- System administration [r]: Add brief definition or description