200 Flashcards
An asymmetric standard for exchanging keys
Diffie-Hellman key exchange
An asymmetrically encrypted signature whose sole purpose is to authenticate the sender
digital signature
An attack that involves navigating to other directories and gaining access to files/directories that would be otherwise restricted
directory traversal attack
The act of recovering data following a disaster that has destroyed it
disaster recovery
A plan outlining the procedure by which data is recovered after a disaster
disaster-recovery plan
A method of restricting access to objects based on the identity of the subjects or the groups to which they belong
Discretionary Access Control (DAC)
Technology that uses two controllers and two disks to keep identical copies of data to prevent the loss of data if one disk fails
disk duplexing
Technology that keeps identical copies of data on two disks to prevent the loss of data if one disk fails
disk mirroring
Technology that enables writing data to multiple disks simultaneously in small portions called stripes
disk striping
A fault-tolerance solution of writing data across a number of disks and recording the parity on another (also known as disk striping with a parity disk) In the event that any of disk fails - the data on it can be re-created by looking at the remaining data and computing parity to figure out the missing data
disk striping with parity
A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public
distributed denial-of-service (DDoS)
An attack method in which a daemon caches DNS reply packets - which sometimes contain other information (data used to fill the packets) The extra data can be scanned for information useful in a brea-in or man-in-the-middle attack
DNS poisoning
The DNS server is given information about a name server that it thinks is legitimate when it isn’t
DNS spoofing
The network service used in TCP/IP networks that translates hostnames to IP addresses
Domain Name System (DNS)
A host that resides on more than one network and possesses more than one physical network card
dual-homed firewall
Looking through trash for clues—often in the form of paper scraps—to find users’ passwords and other pertinent information
dumpster diving
A protocol used on a TCP/IP network to send client configuration data - including IP address - default gateway - subnet mask - and DNS configuration - to clients
Dynamic Host Configuration Protocol (DHCP)
The IEEE standard that defines port-based security for wireless network access control
EAP over LAN (EAPOL)
Dynamic provisioning of resources as needed
elasticity
The interference that can occur during transmissions over copper cable because of electromagnetic energy outside the cable
electromagnetic interference (EMI)
A device that identifies you electronically in the same way as the cards you carry in your wallet
electronic wallet
A type of public key cryptosystem that requires a shorter key length than many other cryptography systems (including the de facto industry standard - RSA)
Elliptic Curve Cryptography (ECC)
A header used to provide a mix of security services in IPv4 and IPv6
Encapsulating Security Payload (ESP)
The process of enclosing data in a packet
encapsulation
The process of converting data into a form that makes it less likely to be suable to anyone intercepting it if they cant decrypt it
encryption
A string of alphanumeric characters used to decrypt encrypted data
encryption key
The process of luring someone
enticement
The process of encouraging an attacker to perform an act - even if they don’t want to do it
entrapment
A key that exists only for that session
ephemeral key
The act of moving something up in priority
escalation
A level of assurance - expressed as a numeric value - based on standards set by the Common Criterion Recognition Agreement (CCRA)
evaluation assurance levels (EALs)
Any noticeable action or occurrence
event
A statement that differs from the norm
exception statement
An authentication protocol used in wireless networks and point-to-point connections
Extensible Authentication Protocol (EAP)
The process of reconstructing a system or switching over to other systems when failure is detected
failover
An event that should be flagged but isn’t
false negative
A flagged event that isn’t really an event and has been falsely triggered
false positive
An electrically conductive wire mesh or other conductor woven into a “cage” that surrounds a room and prevents electromagnetic signals from entering or leaving the room through the walls
Faraday cage
The ability to withstand a fault (failure) without losing data
fault tolerance
A networking protocol that is not routable at the IP layer and thus cannot work across large networks
FCoE (Fibre Channel over Ethernet)