A(s) Flashcards
802.11
Wireless Networking Standard
Integrity axiom
Biba property which states “no write up”
Security Property
Bell-LaPadula which states “no write down”
“Bad” blocks/clusters/sectors
Good disk blocks marked as bad
4GL
Fourth-generation programming language, designed to increase programmer’s efficiency by automating the creation of computer programming code
802.11-1997
The original mode of 802.11 operated at 2 mbps using the 2.4 GHz frequency
802.11a
802.11 mode that operates at 54 mbps using the 5 GHz frequency
802.11b
802.11 mode that operates at 11 mbps using the 2.4 GHz frequency
802.11g
802.11 mode that operates at 54 mbps using the 2.4 GHz frequency
802.11i
The first 802.11 wireless security standard that provides reasonable security
802.11n
802.11 mode that uses both 2.4 and 5 GHz frequencies and allows speeds of 144 mbps and beyond
802.11X
Port-based Network Access Control, layer 2 authentication
ABM
Asynchronous Balanced Mode, HDLC combined mode where nodes may act as primary or secondary, initiating transmissions without receiving permission
Abstraction
Hides unnecessary details from the user
Acceptance Testing
Testing to ensure the software meets the customer’s operational requirements
Access aggregation
The collective entitlements granted by multiple systems to one user. Can lead to authorization creep
ACL
Access Control List
Access Control Matrix
Table defining what access permissions exist between specific subjects and objects
Account Lockout
Disabled an account after a set number of failed logins, sometimes during a specific time period
Accountability
Holds individuals accountable for their actions
Accountability Principle
OECD privacy Guideline Principle which states individuals should have the right to challenge the content of any personal data being held, and have a process for updating their personal data if found to be inaccurate or incomplete
Accreditation
The Data owner’s acceptance of the risk represented by a system
ACK
TCP flag , acknowledge received data
Act honorably, honestly, justly,responsibly, and legally
Second canon of the (ISC)2 Code of Ethnics
Active RFID
Powered RFID tags that can operate via larger distances
Active-active cluster
Involves multiple systems all of which are online and actively processing traffic or data
Active-passive cluster
Involves devices or systems that are already in place, configured, powered on and ready to begin processing network traffic should a failure occur on the primary system