Ch 11- Key Terms Flashcards
Network assessment
Objective review of an organization’s network infrastructure in terms of functionality and security capabilities, used to establish a baseline for future audits
Network audit
Objective periodic review of an organization’s network infrastructure against an established baseline
Hardening
Ensuring that a system or network is configured in such a way that reduces the risk of attack from either internal or external resources
Penetration testing
Process of evaluating network security with a simulated attack on the network from both external and internal attackers
Vulnerability assessment
Process used to identify and quantify any vulnerabilities in a network environment
Data classification
Practice of sorting data into discrete categories that help define the access levels and type of protection required for that set of data
Data encryption
Algorithmic scheme that secures data by scrambling into a code that is not readable by unauthorized resources
Public key infrastructure (PKI)
Hierarchy of trusted security certificates issued to users or computing devices
Certificate of authority (CA)
Entity that issues digital certificates and makes its public keys available to the intended audience to provide proof of its authenticity
Plaintext
Unencrypted data
Cipher text
Data that has been encrypted using a mathematical algorithm
Symmetric encryption
Encryption mechanism that uses a single key to both encrypt and decrypt data
Asymmetric encryption
Encryption mechanism that uses 2 different keys to encrypt and decrypt data
Public key
One-half of the keys used for asymmetric encryption, a public key is available to anyone and is used only for data encryption
Private key
One-half of the keys used for asymmetric encryption, a private key is available only to the intended data user and is used only for data encryption