Difference between revisions of "Blacklisting"
From Clinfowiki
Peggy Hines (Talk | contribs) |
Peggy Hines (Talk | contribs) |
||
Line 1: | Line 1: | ||
− | From the National Institute of Standards and Technology [http://www.nist.gov/index.html (NIST)] ''Glossary of Key Information Security Terms''<ref name="NIST Terms”> IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf</ref> | + | From the National Institute of Standards and Technology [http://www.nist.gov/index.html (NIST)] ''Glossary of Key Information Security Terms'' <ref name="NIST Terms”> IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf</ref> |
The process of the system invalidating a user ID based on the user's inappropriate actions. A blacklisted user ID cannot be used to log on to the system even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources. | The process of the system invalidating a user ID based on the user's inappropriate actions. A blacklisted user ID cannot be used to log on to the system even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources. |
Revision as of 15:04, 6 November 2015
From the National Institute of Standards and Technology (NIST) Glossary of Key Information Security Terms [1]
The process of the system invalidating a user ID based on the user's inappropriate actions. A blacklisted user ID cannot be used to log on to the system even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources.
References
- ↑ IR 7298 Revision 2, Glossary of key information security terms. (2013) National Institute of Standards and Technology http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf