Protected Extensible Authentication Protocol (PEAP)
Protected Extensible Authentication Protocol (PEAP): Protected Extensible Authentication Protocol (PEAP) is an authentication protocol that encapsulates Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel. It is used to enhance the security of wireless networks and VPNs by ensuring that client credentials are transmitted securely over potentially vulnerable or untrusted […]
Preshared Key
Preshared Key: A cryptographic key that is shared between parties before it is used for encryption or authentication purposes. PSKs are commonly used in various forms of secure communication methods, such as wireless networks (like WPA-PSK in Wi-Fi networks) or in VPN connections, to establish a secure channel over an otherwise insecure medium. Despite its […]
Positive-List
Positive-List: A positive-list, more commonly referred to as an “allowlist,” is an access control strategy that specifies allowed entities, such as user IDs, email addresses, or IP addresses. Access is granted only to those on the list, while all others are denied by default. It’s used in security implementations for network access, email filtering, and […]
Permission Aggregation
Permission Aggregation: Permission aggregation is a concept in access control where the system calculates the effective permissions of a user by combining all the rights granted directly to the user and those obtained through group memberships or role assignments. It’s crucial in complex systems with layered security structures to understand a user’s combined permissions, which […]
Permissions
Permissions: The level of access that a user, group, or process has to a system or its resources. They are an essential component of access control, helping to ensure that only authorized individuals or processes can view, modify, or execute specific files or operations. The administration of permissions is a critical task in maintaining system […]
Personal Identification Number (PIN)
Personal Identification Number (PIN): A secret numeric password used to verify a user’s identity and access specific services or systems, providing an additional layer of security against unauthorized access. Examples include ATM PINs and phone unlock codes.