111 relations: Access badge, Access control list, Access Control Matrix, Access modifiers, Accountability, Alarm device, Alarm management, Attribute-based access control, Audit trail, Authentication, Authorization, Automated information system, Bank vault, Barbed tape, Biometrics, Bluetooth Low Energy, Border guard, Bouncer (doorman), Capability-based security, Card reader, Castle, Common Access Card, Computer security, Contactless smart card, Coupling, Credential, Current loop, Data, Data storage, Database, Database transaction, Discretionary access control, Door, Door security, Electronic lock, Encapsulation (computer programming), Federal Standard 1037C, Fence, Fingerprint, Fortification, Identity document, Identity management, Identity-based security, Information hiding, Information security, Internet Protocol, IP access controller, IP reader, Key management, Keychain, ..., Light-emitting diode, Lock (security device), Lock bumping, Lock picking, Lock screen, Logical security, Login, Magnetic stripe card, Malware, Mandatory access control, Mantrap (access control), MIL-STD-188, Multi-factor authentication, Mutator method, National Incident Management System, National Information Assurance Glossary, Near-field communication, Object-capability model, Object-oriented programming, OpenID, Optical turnstile, Organisation-based access control, Password, Photo identification, Physical security, Physical security information management, Physical Security Professional, Piggybacking (security), Policy, Principle of least privilege, Prison, Proof-of-payment, Proximity card, Resource, Role-based access control, RS-485, Safe, Safe-cracking, Sally port, Security, Security alarm, Security engineering, Security lighting, Security management, Security policy, Server room, Shon Harris, Smart card, Social control, System, Telecommunication, Terminal server, Ticket (admission), Trusted system, Turnstile, User (telecommunications), Vertical service code, Wiegand effect, Wiegand interface, XACML, .htaccess. Expand index (61 more) » « Shrink index
An access badge is a credential used to gain entry to an area having automated access control entry points.
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that characterizes the rights of each subject with respect to every object in the system.
Access modifiers (or access specifiers) are keywords in object-oriented languages that set the accessibility of classes, methods, and other members.
In ethics and governance, accountability is answerability, blameworthiness, liability, and the expectation of account-giving.
An alarm device or system of alarm devices gives an audible, visual or other form of alarm signal about a problem or condition.
Alarm management is the application of human factors (or 'ergonomics') along with instrumentation engineering and systems thinking to manage the design of an alarm system to increase its usability.
Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.
An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.
An automated information system (AIS) is an assembly of computer hardware, software, firmware, or any combination of these, configured to accomplish specific information-handling operations, such as communication, computation, dissemination, processing, and storage of information.
A bank vault is a secure space where money, valuables, records, and documents are stored.
Barbed tape or razor wire is a mesh of metal strips with sharp edges whose purpose is to prevent passage by humans.
Biometrics is the technical term for body measurements and calculations.
Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications in the healthcare, fitness, beacons, security, and home entertainment industries.
A border guard of a country is a national security agency that performs border control, i.e., enforces the security of the country's national borders.
A bouncer (also known as a doorman, door supervisor or cooler) is a type of security guard, employed at venues such as bars, nightclubs, stripclubs, casinos, restaurants or concerts.
Capability-based security is a concept in the design of secure computing systems, one of the existing security models.
A card reader is a data input device that reads data from a card-shaped storage medium.
A castle (from castellum) is a type of fortified structure built during the Middle Ages by predominantly the nobility or royalty and by military orders.
Christmas is an annual festival commemorating the birth of Jesus Christ,Martindale, Cyril Charles.
The Christmas season, also called the festive season, or the holiday season (mainly in the U.S. and Canada; often simply called the holidays),, is an annually recurring period recognized in many Western and Western-influenced countries that is generally considered to run from late November to early January.
Christmas Eve is the evening or entire day before Christmas Day, the festival commemorating the birth of Jesus.
Christmas traditions vary from country to country.
The Common Access Card, also commonly referred to as the CAC or CAC card, is a smart card about the size of a credit card.
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
A contactless smart card is a contactless credential whose dimensions are credit-card size.
A coupling is a device used to connect two shafts together at their ends for the purpose of transmitting power.
Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on.
In electrical signalling an analog current loop is used where a device must be monitored or controlled remotely over a pair of conductors.
Data is a set of values of qualitative or quantitative variables.
Data storage is the recording (storing) of information (data) in a storage medium.
A database is an organized collection of data, stored and accessed electronically.
A transaction symbolizes a unit of work performed within a database management system (or similar system) against a database, and treated in a coherent and reliable way independent of other transactions.
In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.
A door is a moving mechanism used to block off and allow access to, an entrance to or within an enclosed space, such as a building, room or vehicle.
The term door security may refer to any of a range of measures used to strengthen doors against door breaching, Ram-raiding and lock picking, and prevent crimes such as burglary and home invasions.
An electronic lock (or electric lock) is a locking device which operates by means of electric current.
In object oriented programming languages, encapsulation is used to refer to one of two related but distinct notions, and sometimes to the combination thereof.
Federal Standard 1037C, titled Telecommunications: Glossary of Telecommunication Terms, is a United States Federal Standard issued by the General Services Administration pursuant to the Federal Property and Administrative Services Act of 1949, as amended.
A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting.
A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.
A fortification is a military construction or building designed for the defense of territories in warfare; and is also used to solidify rule in a region during peacetime.
An identity document (also called a piece of identification or ID, or colloquially as papers) is any document which may be used to prove a person's identity.
Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".
Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual.
In computer science, information hiding is the principle of segregation of the design decisions in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decision is changed.
Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
IP access controller is an electronic security device designed to identify users and control entry to or exit from protected areas.
IP reader is an electronic security device designed to identify users and control entry to or exit from protected areas.
Key management refers to management of cryptographic keys in a cryptosystem.
A keychain, or keyring, is a small chain, usually made from metal or plastic, that connects a small item to a keyring.
A light-emitting diode (LED) is a two-lead semiconductor light source.
A lock is a mechanical or electronic fastening device that is released by a physical object (such as a key, keycard, fingerprint, RFID card, security token, coin etc.), by supplying secret information (such as a keycode or password), or by a combination thereof.
Lock bumping is a lock picking technique for opening a pin tumbler lock using a specially crafted bump key, rapping key or a 999 key.
Although lock picking can be associated with criminal intent, it is an essential skill for the legitimate profession of locksmithing, and is also pursued by law-abiding citizens as a useful skill to learn, or simply as a hobby (locksport).
A lock screen is a computer user interface element used by various operating systems.
Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels.
In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card.
Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.
In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
A mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.
MIL-STD-188 is a series of U.S. military standards relating to telecommunications.
Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).
In computer science, a mutator method is a method used to control changes to a variable.
The National Incident Management System (NIMS) is a standardized approach to incident management developed by the United States Department of Homeland Security.
Committee on National Security Systems Instruction No.
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.
New Year is the time or day at which a new calendar year begins and the calendar's year count increments by one.
New Year's Day, also called simply New Year's or New Year, is observed on January 1, the first day of the year on the modern Gregorian calendar as well as the Julian calendar.
In the Gregorian calendar, New Year's Eve (also known as Old Year's Day or Saint Sylvester's Day in many countries), the last day of the year, is on 31 December which is the seventh day of Christmastide.
The object-capability model is a computer security model.
Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which may contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods. A feature of objects is that an object's procedures can access and often modify the data fields of the object with which they are associated (objects have a notion of "this" or "self").
OpenID is an open standard and decentralized authentication protocol.
An optical turnstile is a physical security device designed to restrict or control access to a building or secure area.
In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003.
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.
Photo identification or photo ID is an identity document that includes a photograph of the holder, usually only his or her face.
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).
Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.
A Physical Security Professional (PSP) is a Board certification process for individuals involved in the physical security of organizations.
In security, piggybacking, similar to tailgating, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint.
A policy is a deliberate system of principles to guide decisions and achieve rational outcomes.
In information security, computer science, and other fields, the principle of least privilege (PoLP, also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.
A prison, also known as a correctional facility, jail, gaol (dated, British English), penitentiary (American English), detention center (American English), or remand center is a facility in which inmates are forcibly confined and denied a variety of freedoms under the authority of the state.
Proof-of-payment (POP) or proof-of-fare (POF) is an honor-based fare collection system used on many public transportation systems.
A proximity card or prox card is a "contactless" smart card which can be read without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards and "contact" type smart cards.
A resource is a source or supply from which a benefit is produced.
In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users.
RS-485, also known as TIA-485(-A), EIA-485, is a standard defining the electrical characteristics of drivers and receivers for use in serial communications systems. Electrical signaling is balanced, and multipoint systems are supported. The standard is jointly published by the Telecommunications Industry Association and Electronic Industries Alliance (TIA/EIA). Digital communications networks implementing the standard can be used effectively over long distances and in electrically noisy environments. Multiple receivers may be connected to such a network in a linear, multidrop bus. These characteristics make RS-485 useful in industrial control systems and similar applications.
A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft and/or damage from fire.
Safe-cracking is the process of opening a safe without either the combination or key.
A sally port is a secure, controlled entryway to a fortification or prison.
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces.
A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or other area.
Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts.
In the field of physical security, security lighting is lighting that intended to deter or detect intrusions or other criminal activity on a piece of real property.
Security management is the identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
Security policy is a definition of what it means to be secure for a system, organization or other entity.
A server room is a room, usually air-conditioned, devoted to the continuous operation of computer servers.
Shon Harris (March 27, 1968 – October 8, 2014) was a prolific author of books and articles on topics related to information security, including study guides for CISSP security certification examination.
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.
Social control is a concept within the disciplines of the social sciences.
A system is a regularly interacting or interdependent group of items forming an integrated whole.
Telecommunication is the transmission of signs, signals, messages, words, writings, images and sounds or information of any nature by wire, radio, optical or other electromagnetic systems.
A terminal server enables organizations to connect devices with an RS-232, RS-422 or RS-485 serial interface to a local area network (LAN).
A ticket is a voucher that indicates that an individual is entitled to admission to an event or establishment such as a theatre, amusement park or tourist attraction, or has a right to travel on a vehicle, such as with an airline ticket, bus ticket or train ticket.
In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy.
A turnstile, also called a baffle gate or turnstyle, is a form of gate which allows one person to pass at a time.
In telecommunications, a user is a person, organization, or other entity that employs the services provided by a telecommunication system, or by an information processing system, for transfer of information.
A vertical service code (VSC) is a sequence of digits and the signals star (*) and number sign (#) dialed on a telephone keypad or rotary dial to enable or disable certain telephony service features.
The Wiegand effect is a nonlinear magnetic effect, named after its discoverer John R. Wiegand, produced in specially annealed and hardened wire called Wiegand wire.
The Wiegand interface is a de facto wiring standard which arose from the popularity of Wiegand effect card readers in the 1980s.
XACML stands for "eXtensible Access Control Markup Language".
A.htaccess (hypertext access) file is a directory-level configuration file supported by several web servers, used for configuration of site-access issues, such as URL redirection, URL shortening, Access-security control (for different webpages and files), and more.
2018 has been designated as the third International Year of the Reef by the International Coral Reef Initiative.
2019 (MMXIX) will be a common year starting on Tuesday of the Gregorian calendar, the 2019th year of the Common Era (CE) and Anno Domini (AD) designations, the 19th year of the 3rd millennium, the 19th year of the 21st century, and the 10th and last year of the 2010s decade.