- An operating system is a collection of programs that allows the user to interact with the computer hardware.
- An operating system is one of the main access points to the database management system.
- If the operating system component of the database security environment is exposed, it can open the door for unlawful individuals to contravene all rules imposed to protect the database.
- Authentication is a process that validates the identity of the user in order to permit access to the operating system.
- Physical authentication methods allow physical entrance to the company property.
- Digital authentication methods are the processes of verifying the identity of the user by means of a digital mechanism or software.
- A digital certification is a digital passport that identifies and verifies the holder of the certificate.
- A digital token is a small electronic device that users keep with them to be used for authentication to a computer or network system.
- A digital card is similar to a credit card; it holds user identification information such as name, ID, and password.
- Kerberos enables two parties to exchange information over an open network by assigning a unique key to each user.
- LDAP is an authentication method that uses a centralized directory database to store information about people, offices, and machines in a hierarchical manner.
- PKI is an authentication method that user keeps a private key and the authentication firm holds a public key.
- Remote authentication Dial-In User Services (RADIUS) is an authentication method commonly used by network devices to provide a centralized authentication mechanism.
- Secure Sockets Layers is a method whereby authentication information is transmitted over the network in an encrypted form.
- SRP is a protocol in which the password is not stored locally in either encrypted or plain text form.
- Authorization is a process that determines whether the user is permitted to perform the function he or she requests.
- Authorization deals with privileges and rights that have been granted to the user.
- A good password policy is the first line of defense for protecting access to an operating system.
- The best password policy is the one that matches your company missions and is enforced at all levels of the organization.
- When set improperly, file permission and file sharing are common threats to system security.
- Sharing files naturally leads to security risks and threats.
- E-mail may be the tool most frequency used by hackers to exploit viruses, worms, and other computer system invaders.
|