Difference between revisions of "Blacklisting"
From Clinfowiki
Peggy Hines (Talk | contribs) (Created page with "== Blacklisting == From the National Institute of Standards and Technology [http://www.nist.gov/index.html (NIST)] ''Glossary of Key Information Security Terms''<ref name="NI...") |
Peggy Hines (Talk | contribs) |
||
(2 intermediate revisions by one user not shown) | |||
Line 1: | Line 1: | ||
− | |||
− | |||
− | The process of the system invalidating a user ID based on the user's inappropriate actions. A blacklisted user ID cannot be used to log on to the system even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources. | + | The process of the system invalidating a user ID based on the user's inappropriate actions. A blacklisted user ID cannot be used to log on to the system even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources. <ref name="NIST Terms”> IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf</ref> |
+ | |||
== References == | == References == | ||
<references/> | <references/> | ||
+ | |||
+ | [[Category: Definition]] |
Latest revision as of 15:13, 6 November 2015
The process of the system invalidating a user ID based on the user's inappropriate actions. A blacklisted user ID cannot be used to log on to the system even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources. [1]
References
- ↑ IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf