100 Flashcards
Agreed-upon principles set forth by a company to govern how the employees of that company may use resources such as computers and Internet access
acceptable use policies
The means of giving or restricting user access to network resources
access control
A table or data file that specifies whether a user or group has access to a specific resource on a computer or network
access control list (ACL)
The point at which access to a network is accomplished This term is often used in relation to a wireless access point (WAP)
access point (AP)
A policy that provides information to the reader about who to contact if a problem is discovered
accountability statement
A response generated in real time
active response
Any action a user undertakes
activity
Protocol used to map known IP addresses to unknown physical addresses
Address Resolution Protocol (ARP)
An attack that convinces the network that the attacker’s MAC address is the one associated with an allowed address so that traffic is wrongly sent to attacker’s machine
Address Resolution Protocol (ARP) poisoning
A control implemented through administrative policies or procedures
administrative control
The user who is accountable and responsible for the network
administrator
A Federal Information Processing Standards (FIPS) publication that specifies a cryptographic algorithm for use by the US government
Advanced Encryption Standard (AES)
More commonly known as ARP poisoning - this involves the MAC (Media Access Control) address of the data being faked
ARP spoofing
An algorithm that uses two keys
asymmetric algorithm
Encryption in which two keys must be used
asymmetric encryption
Any unauthorized intrusion into the normal operations of a computer or computer network
attack
The area of an application that is available to users—those who are authenticated and - more importantly - those who are not
attack surface
Minimizing the possibility of exploitation by reducing the amount of code and limiting potential damage
attack surface reduction (ASR)
The act of tracking resource usage by users
audit
The means of verifying that someone is who they say they are
authentication
A header used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays
Authentication Header (AH)
A type of certificate technology that allows ActiveX components to be validated by a server
Authenticode
A utility used with Windows 7 and 8 for creating a copy of the configuration settings necessary to reach the present state after a disaster
Automated System Recovery (ASR) disk
An opening left in a program application (usually by the developer) that allows additional access to data
backdoor
A reversion - or roll back to a previous state - from a change that had negative consequences
backout
A usable copy of data made to media
backup
A generator that can supply power in the event the primary provider is unable to deliver it
backup generator
A documented plan governing backup situations
backup plan
A written policy detailing the frequency of backups and the location of storage media
backup policy
Looking at the banner - or the header information messages sent with data - to find out about a system(s)
banner grabbing
Comparing performance to a historic metric
baselining
A host with multiple network interface cards so that it can reside on multiple networks
bastion host
A set of rules governing basic operations
best practices
Data that is too large to be dealt with by traditional database management means
Big Data analysis
A probability method of finding collision in hash functions
birthday attack
A Microsoft utility used to encrypt a drive
BitLocker
A method of encryption that processes blocks of data rather than streams
block cipher
A type of symmetric block cipher created by Bruce Schneier
Blowfish
The sending of unsolicited messages over a Bluetooth connection
bluejacking
The gaining of unauthorized access through a Bluetooth connection
bluesnarfing