Card #51 - 100 Flashcards
Authenticating
process of determining whether someone or something is who or what they declare to be, usually done by passwords
Authentication Header (AH)
a security mechanism used in authenticating the origins of datagrams, and in guaranteeing the integrity of the information that’s being send
Authenticode
Microsoft standard for signing files and application including ActiveX controls and works with X.509 certificates and digital signatures
Authorization
process of giving someone permission to do or have something, occurs after Authentication
Availability
data and services must be available when they are needed (availability is reached through methods such as redundancies and backups)
Back door
any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access
Backup
a copy of data and/or applications contained in the IT stored on magnetic media outside of the IT to be used in the event IT data are lost
Backup power
UPS (uninterruptible power supply) gives power for a few minutes while generators are used for long-term power
Bandwidth
relative speed of a network connection
Behavior-based intrusion detection
references a baseline or learned pattern of normal system activity to identify active intrusion attempts
Biba security model
a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity
BioAPI
standard being developed by IBM, Microsoft, Novell and others that will allow different manufacturers’ biometric software to interact
Biometrics
very secure type of authentication that uses anatomical and physiological characteristics to authenticate a user, “something you are”
ex. fingerprint, voice, palm, retina, iris, facial, etc.
Birthday
a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory
Blended Threat
a sophisticated cyber attack that utilizes a mix of malicious code, computer viruses, worms or Trojan horses and exploits multiple software or hardware vulnerabilities known to the attacker
Blind FTP
allows a user to download files only if he or she knows the exact path and file name (user cannot browse the directory structure or list directory contents)
Blocking
the action or process of obstructing movement, progress, or activity in particular (block someone form your site)`
Boot sector virus
virus that replicates itself into the master boot record of a flash drive or hard drive
Bots
remote control agents installed on your system, created to automatically perform specific operations
Broadband
general term used to refer to high-speed network connections