Where the cables and wires are encased for protection
. Blocks certain kinds of electro magnetic frequency, but isn't fool proof
. Standard IT framework for security - prove you are who you say you are, determine what access you have, and a log of who logged in and what time and what they accessed
. Using more than one form - something you are, something you have, something you know, somewhere you are, something you do
. Factor: Biometric - fingerprint, retina scan, voiceprint - mathmetical representations; usually layered with other types
. Factor: You have to have physical access to it - smartcard requiring a PIN, USB token with a certificate, mobile phone with SMS message
. Factor: Password, PIN at an ATM, swipe pattern to open your phone
. Factor: Provides your geographical location and system decides if it's ok to authenticate; IPv4 address, mobile device location service
. Factor: Very specific to you - your handwriting, your typing style
. A third party that facilitates authenticating between 2 different organizations - example would be logging in with FB
. Sign on one time, and all other sign ons are done automatically; Kerberos is used for this in Windows environments
. Domain A trusts Domain B, but Domain B does not trust Domain A
. Both Domains trust each other
. Domain A trusts Domain B, and Domain B trusts Domain C, therefore Domain A trusts Domain C
. A trust is specifically created and applied only to that Domain
.