There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
Answer:
Terminal Access Controller Access Control System (TACACS+)
Explanation:
Terminal Access Controller Access Control System (TACACS+) can be used as an upgrade to RADIUS (Remote Authentication Dial-in User Service) for AAA (Authentication Authorization Accounting) services to connect wireless users to the Windows Active Directory domain.
TACACS+ is a Cisco-based wireless network that uses Transmission Control Protocol (TCP) and provides separate authentication, authorization and accounting services for users in bigger networks.
TACACS+ uses TCP port 49 while RADIUS uses UDP port 1812 and 1813.
Answer:
An Enterprise System
Explanation:
An enterprise system also refered to as an enterprise software is a computer software application used to handle the needs of a business or an enterprise examples are schools, production companies, government ministries and departments, charities etc.
The software provides all the business oriented services for the enterprise, services such as payment processing, students' information management, automated billing and payments etc.
Because enterprises will typically have different departments, the software is able to collect data from all the key business processes across all the departments into a single database which is useable according to different access privilages by all other parts of the enterprise.
Answer:
Control Objectives for Information and related Technology (COBIT)
Explanation:
COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.
To check spelling<span> in a </span>Word<span> document, open up the document, head to the “Review” tab, then click on “</span>Spelling<span> & Grammar” (part of the “Proofing” group of tools).
</span>