800 Flashcards
Layer 1 of the OSI Model
Application
Layer 2 of the OSI Model
Presentation
Layer 3 of the OSI Model
Session
Layer 4 of the OSI Model
Transport
Layer 5 of the OSI Model
Network
Layer 6 of the OSI Model
Data Link
Layer 7 of the OSI Model
Physical
A network database that contains a listing of all network resources - such as users - printers - groups - and so on.
directory
A network service that provides access to a central database of information - which contains detailed information about the resources available on a network.
directory service
A method of communication between wireless receivers.
direct-sequence (DS)
A communications technology that is used to communicate in the 802.11 standard. It accomplishes communication by adding the data that is to be transmitted to a higher-speed transmission
direct-sequence spread spectrum (DSSS)
The act of recovering data following a disaster that has destroyed the data.
disaster recovery
The procedure by which data is recovered after a disaster.
disaster recovery plan
A means of restricting access to objects based on the identity of subjects and/or groups to which they belong.
Discretionary Access Control (DAC)
Technology that keeps identical copies of data on two disks to prevent the loss of data if one disk faults.
disk mirroring
Technology that enables writing data to multiple disks simultaneously in small portions called stripes.
disk striping
A fault-tolerance solution of writing data across a number of disks and recording the parity on another. In the event any one disk fails - the data on it can be recreated by looking at the remaining data and computing parity to figure out the missing data.
disk striping with parity
A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target.
Distributed Denial of Service (DDoS) attack
Any server that performs host name-to-IP address resolution.
DNS server
An area in the DNS hierarchy that is managed as a single unit.
DNS zone
Within the Internet - this is a group of computers with shared traits and a common IP address set.
domain
The network service used in TCP/IP networks that translates host names to IP addresses.
Domain Name Service (DNS)
A host that resides on more than one network and posses more than one physical network card.
dual-homed host
A keyboard and monitor that send keystrokes to a central processing computer (typically a mainframe or minicomputer) that returns screen displays to the monitor. The unit has no processing power of its own.
dumb terminal
Looking through trash for clues–often in the form of paper scraps–to users’ passwords and other pertinent information.
dumpster diving
Two hard drives to which identical information is written simultaneously. A dedicated controller card controls each drive. Used for fault tolerance.
duplexed hard drives
Two servers that are identical - for use in clustering.
duplicate servers
A protocol used on a TCP/IP network to send client configuration data - including TCP/IP address - default gateway - subnet mask - and DNS configuration - to clients.
Dynamic Host Configuration Protocol (DHCP)
A type of firewall used to accept or reject packets based on their contents.
dynamic packet filtering
The use of route-discovery protocols to talk to other routers and find out what networks they are attached to. Routers that use dynamic routing send out special packets to request updates from the other routers on the network as well as to send their own updates.
dynamic routing
A TCP/IP port used by an application when needed. The port isn’t constantly used.
dynamically allocated port
Any type of passive attack that intercepts data in an unauthorized manner–usually in order to find passwords.
eavesdropping
The interference that can occur during transmissions over copper cable because of electromagnetic energy outside the cable. The result is degradation of the signal.
electromagnetic interference (EMI)
A type of public key cryptosystem that requires a shorter key length than many other cryptosystems (including the de facto industry standard - RSA).
Elliptic Curve Cryptosystem (ECC)
A header used to provide a mix of security services in IPv4 and IPv6. ESP can be used alone or in combination with the IP Authentication Header (AH).
Encapsulating Security Payload (ESP)
The process of translating data into signals that can be transmitted on a transmission medium.
encoding
The process of converting data into a form that makes it less likely to be usable to anyone intercepting it if they can’t decrypt it.
encryption
A string of alphanumeric characters used to decrypt encrypted data.
encryption key
The process of luring someone.
enticement
The process of encouraging an attacker to perform an act - even if they don’t want to do it.
entrapment