Applied Research
Research conducted to gain the knowledge or understanding to meet a specific, recognized need.
Assessment, Authorization, and Monitoring
A family of security controls that enable an organization to periodically assess the security controls effectiveness
Asset
Any hardware, software, system, or data owned, leased, vended, contracted, or operated by the university that is essential to its operations
Assurance Level
The degree of confidence in the identity verification, authentication process, and security measures used to issue and manage digital certificates
Audit and Accountability
A family of security controls that allow an organization to create, protect, and retain system audit record
Authentication
Authentication is a way of establishing that the user is who they claim to be before granting access to university systems and data.
Authentication Header Protocol (AH)
An IPSec security protocol that can provide integrity protection for packet headers and data through authentication
Authentication Information
Washington University in St. Louis uses a two-factor (or two-step) authentication service provided by Duo…
Authenticator
A system or device that verifies the identity of a user or network element