Difference between revisions of "Blacklisting"

From Clinfowiki
Jump to: navigation, search
Line 1: Line 1:
  
From the National Institute of Standards and Technology [http://www.nist.gov/index.html (NIST)] ''Glossary of Key Information Security Terms''<ref name="NIST Terms”> IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf</ref>
+
From the National Institute of Standards and Technology [http://www.nist.gov/index.html (NIST)] ''Glossary of Key Information Security Terms'' <ref name="NIST Terms”> IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf</ref>
  
 
The process of the system invalidating a user ID based on the user's inappropriate actions.  A blacklisted user ID cannot be used to log on to the system even with the correct authenticator.  Blacklisting and lifting of a blacklisting are both security-relevant events.  Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources.
 
The process of the system invalidating a user ID based on the user's inappropriate actions.  A blacklisted user ID cannot be used to log on to the system even with the correct authenticator.  Blacklisting and lifting of a blacklisting are both security-relevant events.  Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources.

Revision as of 15:04, 6 November 2015

From the National Institute of Standards and Technology (NIST) Glossary of Key Information Security Terms [1]

The process of the system invalidating a user ID based on the user's inappropriate actions. A blacklisted user ID cannot be used to log on to the system even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources.

References

  1. IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf