300 Flashcards
A message and management protocol for TCP/IP
Internet Control Message Protocol (ICMP)
An international organization that works under the Internet Architecture Board to establish standards and protocols relatings to the Internet
Internet Engineering Task Force (IETF)
The network layer responsible for routing - IP addressing - and packaging
Internet layer
A protocol with a store-and-forward capability
Internet Message Access Protocol (IMAP)
The protocol in the TCP/IP suite responsible for network addressing
Internet Protocol (IP)
A set of protocols that enable encryption - authentication - and integrity over IP
Internet Protocol Security (IPSec)
A professional membership group composed primarily of Internet experts
Internet Society (ISOC)
The act of entering a system without authorization to do so
intrusion
Tools that identify and respond to attacks using defined rules or logic
intrusion detection system (IDS)
Penetration-type testing that involves trying to break into the network
intrusive tests
Making the data look as if it came from a trusted host when it didn’t (thus spoofing the IP address of the sending host)
IP spoofing
A protocol that enables the creation of storage area networks (SANs) and is used in sending storage-related commands over IP networks
iSCSI (Internet Small Computer Systems Interface)
An attack that involves looking at repeated results in order to crack the WEP secret key
IV attack
Purposely obstructing or interfering with a signal
jamming
A policy of rotating employees through various jobs
job rotation policy
The ability of a filesystem to use a log file of all changes and transactions that have occurred within a set period of time (for example - the last few houres) If a crash occurrs - the operating system can look at the log files to see what transactions have been committed and which ones have not
journaling
An authentication scheme that uses tickets (unique keys) embedded within messages
Kerberos
A principle that states that the security of an algorithm should depend only on the secrecy of the key and not on the secrecy of the algorithm itself
Kerckhoffs’s principle
An organization or facility that generates keys for users and is a part of Kerberos
key distribution center (KDC)
An agency that stores keys for the purpose of law-enforcement access
key escrow agency
A method of offering mutual authentication and establishing data encryption keys
Key Exchange Algorithm (KEA)
The act of creating keys for use by users
key generation
The temporary deferment of a key for a period of time (such as for a leave of absence
key suspension
The wait time between the call for an action or activity and the actual execution of that action
latency
The concept that access differs at different levels
lattice-based control
A tunneling protocol often used with virtual private networks (VPNs) L2F was developed by Cisco
Layer 2 Forwarding (L2F)
A tunneling protocol that adds functionality to the Point-to-Point (PPP) This protocol was created by Microsoft and Cisco - and it is often used with virtual private networkds (VPNs)
Layer 2 Tunneling Protocol (L2TP)
Exploiting weaknesses in LDAP (Lightweight Directory Access Protocol) Implementations by not properly filtering input
LDAP injection attack
A permission method in which users are granted only the privileges necessary to perform their job function
least privilege
The policy of giving a user only the minimum permissions needed to do the work that must be done
least privilege policy
A set of protocols that was derived from x
Lightweight Directory Access Protocol (LDAP)
An authentication protocol created by Cisco as an extension to EAP
Lightweight Extensible Authentication Protocol (LEAP
Assigning a quantitative number to the chance that something will occur
likelihood
Limiting network access to a list of the MAC addresses associated with known users computers
MAC filtering
A software exploitation virus that works by using the macro feature included in many applications - such as Microsoft Office
macro virus
Any code that is meant to do harm
malicious code
A threat from someone inside the organization intent on doing harm
malicious insider threat
A security policy in which labels are used to identify the sensitivity of objects
Mandatory Access Control
A policy requiring earned vacation time be used or lost
mandatory vacation policy
An attack that occurs when someone/something that is trusted intercepts packets and retransmits them to another party
man-in-the-middle