Browse Definitions :
Definition

common access card (CAC)

1. A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication. CACs are issued as standard identification for active-duty military personnel, reserve personnel, civilian employees, non-DoD government employees, state employees of the National Guard and eligible contractor personnel. In addition to its use as an ID card, a CAC is required for access to government buildings and computer networks.  

A CAC is about the size of a standard debit card and has an embedded microchip that enables the encryption and cryptographic signing of email and use of public key infrastructure (PKI) authentication tools. The microchip contains a digital image of the cardholder’s face, two digital fingerprints, organizational affiliation, Social Security number, agency, card expiration date, and PKI certificate.  

When a CAC is inserted into a smart card reader and the associated PIN has been entered, software in the reader uses standard Internet protocols to compare the information on the card's chip with data on a government server and either grant or deny access.  While a CAC is being used to access a computer system, the card stays in the reader for the duration of the session. When the card is removed from the reader, the session ends and the system remains inaccessible until the next user is validated.

There are currently four kinds of  DoD CAC cards:

  • Geneva Conventions Identification Card - issued to active duty/reserve armed forces and uniform service members. 
  • Geneva Convention Accompany Forces Card - issued to emergency-essential civilian personnel.
  • ID and Privilege Common Access Card - issued to civilians residing on military installations.
  • ID card for DOD/Government Agency identification - issued to civilian employees and contractors.

The DoD began issuing CACs in October 2006 in compliance with Homeland Security Presidential Directive 12/HSPD-12.  

See also:  FIPS, personal identity verification (PIV) cards

2. In general, a common access card is any corporate card issued to an employee that provides the employee access to buildings, company data or facilities such as elevators, bathrooms or copy rooms. 

Learn more about common access cards:

The Department of Defense website has more information about CACs.

Smart cards can be vulnerable to differential power analysis (DPA) attacks.

Common access cards are a new feature for Oracle Database Lite..

This was last updated in November 2010

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

What are the Cryptographic Solutions for CAC?

Cancel
Would the chip on a CAC be capable of holding data, much like a USB or a memory card?
Cancel

-ADS BY GOOGLE

Extensiones de Documento y Formatos de Documento

Accionado por:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close