Credentialing (information security)/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} {{TOC|right}} ==Parent topics== {{r|Information security}} {{r|Identification, authentication and credentialing}} ==Subtopics== {{r|Principle of Least Privilege}} {{r|Acc...) |
John Leach (talk | contribs) m (Text replacement - "{{r|Access control list}}↵" to "") |
||
(One intermediate revision by one other user not shown) | |||
Line 9: | Line 9: | ||
==Subtopics== | ==Subtopics== | ||
{{r|Principle of Least Privilege}} | {{r|Principle of Least Privilege}} | ||
{{r|Mandatory Access Control}} | {{r|Mandatory Access Control}} | ||
==Other related topics== | ==Other related topics== | ||
{{r|Identification (information security)}} | |||
{{r|Authentication (information security)}} | |||
{{r|Kerberos}} | {{r|Kerberos}} | ||
{{r|System administration}} | {{r|System administration}} |
Latest revision as of 05:38, 15 March 2024
Credentialing (information security): Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified and authenticated; ideally follows the Principle of Least Privilege [e]
This article contains just a definition and optionally other subpages (such as a list of related articles), but no metadata. Create the metadata page if you want to expand this into a full article.
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Identification, authentication and credentialing [r]: Add brief definition or description
Subtopics
- Principle of Least Privilege [r]: A security principle that gives individuals only the special privileges needed to carry out a specific function; the default condition is that individuals do not have any privileges that were not explicitly granted. [e]
- Mandatory Access Control [r]: Add brief definition or description
- Identification (information security) [r]: Add brief definition or description
- Authentication (information security) [r]: Technologies and procedures used to confirm one's identification to a secure information system [e]
- Kerberos [r]: A protocol using a central server to provide two clients with a shared session key, without either client having to publish a public key. [e]
- System administration [r]: Add brief definition or description