CS Midterm Flashcards
AAA
Authentication, authorization and Accounting
Access Control
Mechanisms or methods used to determine what access permissions subjects have for objects.
Accounting
Collection of billing and other detail records kept for network access.
Authentication
The process by which a subject’s identity is verified
Authentication Header (AH)
A portion of the IPsec security protocol that provides authentication services and replay-detection ability. Can be used with Encapsulating Security Payload (ESP)
Authorization
granting of specific permissions based on privileges held by the account.
Content Protection
Protection of the data portion of a datagram
Context Protection
Protection of the header of a datagram
Discretionary Access Control (DAC)
An access control mechanism in which the owner of an object (such as a file) can decide which other subjects may have access to the object and what type of access.
Encapsulating Security Payload (ESP)
A portion of the IPsec implementation that provides for data confidentiality with optional authentication and replay detection services. ESP completely encapsulates user data in the datagram and can be used by itself or in conjunction with Authentication Headers.
Identification
Process of ascribing a computer ID to a specific user, computer network device or computer process.
Internet Key Exchange (IKE)
The protocol formerly known as ISAKMP/Oakley. A hybrid protocol that uses part Oakley and part SEMI inside the Internet Security Association framework. IKE is used to establish a shared security policy and authenticated keys for services that require keys.
Internet Protocol Security (IPsec)
A protocol used to secure IP packets during transmission across a network. Offers authentication, integrity and confidentiality services. Uses AH and ESP.
Internet Security Association & Key Management Protocol (ISAKMP)
A protocol framework that defines the mechanics of implementing a key exchange protocol and negotiation of a security policy.
Kerberos
A network authentication protocol designed by MIT for use in client/server environments.
Key Distribution Center (KDC)
A portion of the Kerberos authentication system.
Layer 2 Tunneling Protocol (L2TP)
A Cisco switching protocol that operates at the data link layer.
Mandatory Access Control (MAC)
An access control mechanism in which the security mechanism controls access to all objects and individual subjects cannot change that access.
Point to Point Protocol
The Internet standard for transmission of IP packets over a serial line, as in a dial-up connection to an ISP.
Remote Access Server (RAS)
A combination of hardware and software used to enable remote access to a network.
Role-based Access Control
An access control mechanism in which, a set of roles that the user may perform depends on access.
Rule-Based Access Control
Access Control mechanism based on rules
Security Association (SA)
An instance of security policy and keying material applied to a specific data flow.
Virtual Private Network (VPN)
An encrypted network connection across another network offering a private communication channel.