1-3 Flashcards
a check of a systems security, usually including a review of documents, procedures, and system configurations
auditing
the process of verifying that a user is authorized to access some resource
authenticate
numbers that use the base 2 number system
binary numbers
a hacker with a malicious purpose, synonymous with a cracker
black hat hacker
the act of preventing transmissions of some type
blocking
to successfully break into a system
breach
an attack that seeks to overwrite a memory buffer with more data than it is designed to hold
buffer overflow
an approach to security that is proactive rather than reactive
dynamic security approach
one who hacks into systems in order to accomplish some goal that he or she feels is ethically valid
ethical hacker
a security approach that also secures the internal components of the network, not just the perimeter
layered security approach
any software that has a malicious purpose such as a virus or trojan horse
malware
network interface card
nic
the process of verifying a connection so that neither party can later deny, or reupdate, the transaction
non-repudation