Chapter 7 Key Terms Flashcards
Learn the definitions of the Key Terms used within the Healthcare and IT world
Antispyware
A program designed to prevent spyware from being installed on a computer
Badge
A card with a magnetic strip or chip that identifies the person assigned to the card
Biometric Scanner
A device used to identify a person based on biological data
Data Encryption Standard (DES)
An outdated block cipher that uses a 64-bit cipher block and a 56-bit key
Heating, Ventilation, and Air Conditioning (HVAC) unit
Equipment designed to regulate temperature and humidity
Intermediate Distribution Frame (IDF)
A cable rack that connects and manages wiring used for telecommunicating between MDF and devices such as computers or network printers. IDFs are usually found on each floor of a building in a data closet
Key Fob
A device synched with a network authentication service that provides a code used to log in to a network or other system
Layer 2 Tunneling Protocol (L2TP)
A fully encrypted tunneling protocol used to create a VPN connection
Main Distribution Frame (MDF)
A cable rack that connects and manages wiring used for telecommunication between a service provider and intermediate distribution frames (IDFs). The MDF connects private or public lines coming into a facility with the networking devices in the facility
Malicious Software
Any program unknowingly transmitted to a computer or network designed to cause damage, also called malware
Malware
Any program unknowingly transmitted to a computer or network designed to cause damage
Media Access Control (MAC) Filtering
The method to secure a network by limiting which devices are allowed to connect to a network based on a list of MAC addresses kept by the wireless access points
Network Attached Storage (NAS)
A storage device connected directly to the network
Phishing
A form of social engineering in which an attacker tricks or manipulates a user to giving out sensitive data or into allowing unauthorized programs onto the computer or network
Pretty Good Privacy (PGP)
An encryption method designed for signing and encrypting e-mail, which uses both symmetric and asymmetric encryption
Remote Desktop Connection (RDP)
A remote connection used to view another computer’s desktop in a window. RDC was created by Microsoft
Secure Shell (SSH)
An encrypted tunneling protocol used by clients/server applications to connect a remote client to a sever. The protocol is designed to ensure confidentiality and integrity of data over an unsecured network
Secure Socket Layer (SSL)
A malicious attack using social directed at a person who has access to sensitive data
Social Engineering
A malicious attack using social directed at a person who has access to sensitive data
Spam
Unsolicited contact that you did not ask for and don’t want and might come from an attacker
Spyware
A type of malware designed to secretly collect information on a computer or network
Storage Area Network (SAN)
An independent network separate from the normal LAN designed for data storage
Terminal Emulator
A connection to a mainframe computer that holds all the data being accessed. A terminal emulator typically looks like a command prompt window
Triple Data Encryption Standard (3DES)
An encryption similar to DES but uses a key that can be three times the size, at a 168-bit key