Appendix eL

Glossary

John R. Vacca
AAA   Administration, authorization, and authentication. Protocol for authenticating a user based on his or her verifiable identity, authorizing a user based on his or her rights, and accounting for a user's consumption of network resources.
Access   A specific type of interaction between a subject and an object that results in the flow of information from one to the other. The capability and opportunity to gain knowledge of, or to alter information or materials including the ability and means to communicate with (input or receive output), or otherwise make use of any information, resource, or component in a computer system.
Access Control   The process of limiting access to the resources of a system to only authorized ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.