Showing: All results

Applied Research

Research conducted to gain the knowledge or understanding to meet a specific, recognized need.

Assessment, Authorization, and Monitoring

A family of security controls that enable an organization to periodically assess the security controls effectiveness

Asset

Any hardware, software, system, or data owned, leased, vended, contracted, or operated by the university that is essential to its operations

Assurance Level

The degree of confidence in the identity verification, authentication process, and security measures used to issue and manage digital certificates

Audit and Accountability

A family of security controls that allow an organization to create, protect, and retain system audit record

Authentication

Authentication is a way of establishing that the user is who they claim to be before granting access to university systems and data.

Authentication Header Protocol (AH) 

An IPSec security protocol that can provide integrity protection for packet headers and data through authentication

Authentication Information

Washington University in St. Louis uses a two-factor (or two-step) authentication service provided by Duo…

Authenticator

A system or device that verifies the identity of a user or network element