A+ Core 2 Certification Cram Notes : Security
2.1 Summarize the following security measures and their purposes
Explain the following Logical security processes/methods
1. Principle of least privilege: This security principle limits the access of users and processes to only those resources necessary to perform their work. This minimizes the potential damage in the event of a security breach.
2. Access control lists (ACLs): ACLs are used to define and manage access to resources, such as files and folders, based on the user or group attempting to access them.
3. Multifactor authentication (MFA): MFA requires users to provide multiple forms of authentication to access a system or resource. This can include a password, a smart card, or a biometric scan.
4. Email: Email security involves protecting messages and attachments from unauthorized access, modification, and disclosure.
5. Hard token: A hard token is a physical device, such as a USB key, that generates one-time passwords for authentication.
6. Soft token: A soft token is a software application that generates one-time passwords for authentication, typically installed on a mobile device.
7. Short message service (SMS): SMS is a text messaging service used for sending messages to mobile devices. It can be used for two-factor authentication.
8. Voice call: Voice call is a communication method that can be used for two-factor authentication.
9. Authenticator application: An authenticator application is a software application that generates one-time passwords for authentication, typically installed on a mobile device.