The following acronyms and terms are used in this chapter. For the explanation and definition purpose of this chapter, these acronyms and terms are defined as follows:
The traceability of actions performed on a system to a specific system entity or user.
The new U.S. standard for encrypting sensitive but unclassified data. Also known as Rijndael, this symmetric encryption standard can be implemented in one of three key sizes: 128, 192, and 256 bits. It is considered a fast, simple, robust encryption mechanism.
A method that enables you to identify someone. Authentication verifies the identity and legitimacy of the individual to access the system and its resources. Common ...