Cards #151 - 200 Flashcards
Full backup
complete, comprehensive backups of all files on a disk of server
Gateway
a bridge between two network
Hacker
unauthorized user who attempts to or gains access to an information system
Harassing
subject to aggressive pressure or intimidation
Hardware security
can be composed of adding cable locks to computers o prevent thieves from walking out with copies of customer database
Hash function
use one key for encryption and another for decrypting
Honeypot
computer system on the internet that is expressly set up to attract and “trap” intruders
Host integrity
the ability to define, enforce, and restore the security of client computers to keep enterprise networks and data secure
Host-based IDS
a software application installed on a system and monitors activity only on the local system (rely on information from audit and system log files to detect intrusion)
Hot site
up and operational 24/7 and would be able to take over functionally form a primary site within minutes of a primary site failure
How does NAT server help protect your network?
masking the IP addresses of internal computers from the internet
How does spyware differ from other forms of malware, such as worms and viruses
Not all spyware is malicious
HTTP
Hyper-Text Transfer Protocol. Used for websites
HTTPS
Hyper-Text Transfer Protocol over Secure Socket Layer. authentication of the server, the data transmitted over a HTTPS connection is encrypted and confidential
ICMP
Internet Control Message Protocol. used by a router to exchange information with other routers