Ack3 Flashcards
DER
Distinguished Encoding Rules
binary format used to structure the information in a digital certificate
DES
Data Encryption Standard
DHCP
Dynamic Host Configuration Protocol
Only one server should be offering up IP addresses. a rogue can DoS or snoop, or starve (repeat IP requests)
DHE
Diffie-Hellman Ephemeral
DKIM
Domain Keys Identified Mail
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMARC
Domain Message Authentication Reporting & Conformance
DMZ
Demilitarized Zone
DNAT
Destination Network Address Transaction
NAT service where private Internal addresses are mapped to one or more public addresses to facilitate Internet connectivity for hosts on a local network via a router
DNS
Domain Name Systen
Ph book of the internet
DNSSEC
Domain Name System Security Extensions
A security protocol that provides authentication of DNS data and upholds DNS data integrity
DoS
Denial-of-service
Any type of physical, application, or network attack that affects the availability of a managed resource.
DPO
Data Protection Officer
DRP
Disaster Recovery Plan
DSA
Digital Subscriber Line (internet access over voice lines)
EAP
Extensible Authentication Protocol
Authenticate clients & LAN
ECB
Electronic Code Book
first generation of the AES. It is the most basic form of block cipher encryption
ECC
Elliptic-curve Cryptography
An asymmetric encryption algorithm that leverages the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.
ECC
ECDHE
ECDSA
Elliptic-curve Crytpography
Elliptic-curve Diffie-Helman Ephemeral
Elliptic-curve Digital Signature Algorithm
EDR
Endpoint Detection & Response
software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats
EFS
Encrypted File System
EIP
Extended Instruction Pointer
EOL
End of Life
Product life cycle phase where sales are discontinued and support options reduced over time