Chapter 11 Terms Flashcards
SSH
A connection utility that provides authentication and encryption while logging on to a host, executing commands on that host, and copying files to or from that host. Uses Port 22.
Honeypot
A decoy system isolated for legitimate systems and designed to be vulnerable to security exploits for the purpose of learning more about hacking techniques or nabbing a hacker in the act.
IPS
A dedicated device or software running on a host that automatically reacts to any unauthorized attempt to access an organization’s secured resources on a network or host. It is often combined with IDS.
IDS
A dedicated device or software running on a host that monitors, flags, and logs any unauthorized attempt to access an organization’s secured resources on a network or host.
ACL
A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Kerberos
A network authentication protocol which works on the basis of “tickets” to allow nodes communicating over a non-secure network to prove their identity to one another. Its designers aimed primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other’s identity. Uses Port 88.
AES
A private key encryption algorithm that weaves keys of 128, 160, 192, or 256 bits through data multiple times.
DoS attack
A security attack in which a system becomes unable to function because it has been inundated with requests for services and can’t respond to any of them.
HTTP
A set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. Uses Port 80.
Asymmetric encryption
A type of encryption (such as public key encryption) that uses a different key for encoding data than is used for decoding the ciphertext.
brute force attack
An attempt to discover an encryption key or password by trying numerous possible character combinations.
CHAP
An authentication protocol that operates over PPP and requires the authenticator to take the first step by offering the other computer a challenge.
CA
An organization that issues and maintains digital certificates as part of the Public-key Infrastructure.
IPSec
Defines encryption, authentication, and key management for TCP/IP transmissions. It is an enhancement for IPv4 and is native to IPv6.
ESP
In IPSec, this is a type of encryption that provides authentication of the IP packet’s data payload through the public key technique. It also encrypts the entire IP packet for added security.