Ch 11- Key Terms Flashcards

1
Q

Network assessment

A

Objective review of an organization’s network infrastructure in terms of functionality and security capabilities, used to establish a baseline for future audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network audit

A

Objective periodic review of an organization’s network infrastructure against an established baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardening

A

Ensuring that a system or network is configured in such a way that reduces the risk of attack from either internal or external resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Penetration testing

A

Process of evaluating network security with a simulated attack on the network from both external and internal attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability assessment

A

Process used to identify and quantify any vulnerabilities in a network environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data classification

A

Practice of sorting data into discrete categories that help define the access levels and type of protection required for that set of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data encryption

A

Algorithmic scheme that secures data by scrambling into a code that is not readable by unauthorized resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public key infrastructure (PKI)

A

Hierarchy of trusted security certificates issued to users or computing devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Certificate of authority (CA)

A

Entity that issues digital certificates and makes its public keys available to the intended audience to provide proof of its authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Plaintext

A

Unencrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cipher text

A

Data that has been encrypted using a mathematical algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Symmetric encryption

A

Encryption mechanism that uses a single key to both encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric encryption

A

Encryption mechanism that uses 2 different keys to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public key

A

One-half of the keys used for asymmetric encryption, a public key is available to anyone and is used only for data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Private key

A

One-half of the keys used for asymmetric encryption, a private key is available only to the intended data user and is used only for data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital signature

A

Mathematical hash of a dataset that is encrypted by the private key and used to validate that dataset

17
Q

Block cipher

A

A method of converting plaintext to cipher text in bulk as opposed to one data bit at a time, either using a fixed secret key or by generating keys from each encrypted block

18
Q

Stream cipher

A

A method of converting plaintext to cipher text 1 bit at a time

19
Q

Role-based access control (RBAC)

A

Security mechanism in which all access is granted through predefined collections of permissions, called roles, instead of implicitly assigning access to users or resources individually

20
Q

Mandatory access control (MAC)

A

Security mechanism in which access is mandated by the operating system or application and not by data owners

21
Q

Discretionary access control (DAC)

A

Security mechanism in which the power to grant or deny permissions to resources lies with the data owner

22
Q

Multifactor authentication

A

Authentication of resources using proof from more than 1 of the 3 authentication categories: something you know, something you have, and something you are

23
Q

Single sign-on (SSO)

A

Authentication process in which the resource requesting access can enter 1 set of credentials and use those credentials to access multiple applications or datasets, even if they have separate authentication mechanisms

24
Q

Federation

A

Use of SSO to authenticate users or devices to many different protected network resources, such as file servers, websites, and database applications