Chapter 7: Security Flashcards
DES
data encryption standard
HVAC
heating, ventilation, and air conditioning
IDF
intermediate distribution frame
L2TP
Layer 2 tunneling protocol
MDF
main distribution frame
MAC
media access control
NAS
network attached storage
PGP
pretty good privacy
RDC
remote desktop connection
SSH
secure shell
SSL
secure socket layer
SAN
storage area network
3DES
triple data encryption standard
antispyware
A program designed to prevent spyware from being installed on a computer.
badge
A card with a magnetic strip or chip that identifies the person assigned to the card.
biometric scanner
A device used to identify a person based on biological data.
data encryption standard (DES)
An outdated block cipher that uses a 64-bit cipher block and a 56-bit key.
heating, ventilation, and air conditioning (HVAC) unit
Equipment designed to regulate temperature and humidity.
intermediate distribution frame (IDF)
A cable rack that connects and manages wiring used for telecommunication between the MDF and devices such as computers or network printers. IDFs are usually found on each floor of a building in a data closet.
key fob
A device synched with a network authentication service that provides a code used to log in to a network or other system
Layer 2 tunneling protocol (L2TP)
A fully encrypted tunneling protocol used to create a VPN connection
main distribution frame (MDF)
A cable rack that connects and manages wiring used for telecommunication between a service provider and intermediate distribution frames (IDFs). The MDF connects private or public lines coming into a facility with the networking devices in the facility.
malicious software
Any program unknowingly transmitted to a computer or network designed to cause damage. Also called malware
malware
See malicious software.
media access control (MAC) filtering
The method to secure a network by limiting which devices are allowed to connect to a network based on a list of MAC addresses kept by the wireless access points.
network attached storage (NAS)
A storage device connected directly to the network
phishing
A form of social engineering in which an attacker tricks or manipulates a user to give out sensitive data or into allowing unauthorized programs onto the computer or network.
pretty good privacy (PGP)
An encryption method designed for signing and encrypting e-mail, which uses both symmetric and asymmetric encryption.
remote desktop connection (RDC)
A remote connection used to view another computer’s desktop in a window. RDC was created by Microsoft.
secure shell (SSH)
An encrypted tunneling protocol used by client/server applications to connect a remote client to a server. The protocol is designed to ensure confidentiality and integrity of data over an unsecured network.
secure socket layer (SSL)
A handshake between a web server and a browser to establish a secure connection.
spam
Unsolicited contact that you did not ask for and don’t want and might come from an attacker.
social engineering
A malicious attack using social skills directed at a person who has access to sensitive data.
spyware
A type of malware designed to secretly collect information on a computer or network.
storage area network (SAN)
An independent network separate from the normal LAN designed for data storage.
terminal emulator
A connection to a mainframe computer that holds all the data being accessed. A terminal emulator typically looks like a command prompt window.
triple data encryption standard (3DES)
An encryption similar to DES but uses a key that can be three times the size, at a 168-bit key.