Difference between revisions of "Blacklisting"

From Clinfowiki
Jump to: navigation, search
 
Line 1: Line 1:
  
From the National Institute of Standards and Technology [http://www.nist.gov/index.html (NIST)] ''Glossary of Key Information Security Terms'' <ref name="NIST Terms”> IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf</ref>
 
  
The process of the system invalidating a user ID based on the user's inappropriate actions.  A blacklisted user ID cannot be used to log on to the system even with the correct authenticator.  Blacklisting and lifting of a blacklisting are both security-relevant events.  Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources.
+
The process of the system invalidating a user ID based on the user's inappropriate actions.  A blacklisted user ID cannot be used to log on to the system even with the correct authenticator.  Blacklisting and lifting of a blacklisting are both security-relevant events.  Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources. <ref name="NIST Terms”> IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf</ref>
 +
 
  
 
== References ==
 
== References ==

Latest revision as of 15:13, 6 November 2015


The process of the system invalidating a user ID based on the user's inappropriate actions. A blacklisted user ID cannot be used to log on to the system even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources. [1]


References

  1. IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf