CS Midterm Flashcards
AAA
Authentication, authorization and Accounting
Access Control
Mechanisms or methods used to determine what access permissions subjects have for objects.
Accounting
Collection of billing and other detail records kept for network access.
Authentication
The process by which a subject’s identity is verified
Authentication Header (AH)
A portion of the IPsec security protocol that provides authentication services and replay-detection ability. Can be used with Encapsulating Security Payload (ESP)
Authorization
granting of specific permissions based on privileges held by the account.
Content Protection
Protection of the data portion of a datagram
Context Protection
Protection of the header of a datagram
Discretionary Access Control (DAC)
An access control mechanism in which the owner of an object (such as a file) can decide which other subjects may have access to the object and what type of access.
Encapsulating Security Payload (ESP)
A portion of the IPsec implementation that provides for data confidentiality with optional authentication and replay detection services. ESP completely encapsulates user data in the datagram and can be used by itself or in conjunction with Authentication Headers.
Identification
Process of ascribing a computer ID to a specific user, computer network device or computer process.
Internet Key Exchange (IKE)
The protocol formerly known as ISAKMP/Oakley. A hybrid protocol that uses part Oakley and part SEMI inside the Internet Security Association framework. IKE is used to establish a shared security policy and authenticated keys for services that require keys.
Internet Protocol Security (IPsec)
A protocol used to secure IP packets during transmission across a network. Offers authentication, integrity and confidentiality services. Uses AH and ESP.
Internet Security Association & Key Management Protocol (ISAKMP)
A protocol framework that defines the mechanics of implementing a key exchange protocol and negotiation of a security policy.
Kerberos
A network authentication protocol designed by MIT for use in client/server environments.
Key Distribution Center (KDC)
A portion of the Kerberos authentication system.
Layer 2 Tunneling Protocol (L2TP)
A Cisco switching protocol that operates at the data link layer.
Mandatory Access Control (MAC)
An access control mechanism in which the security mechanism controls access to all objects and individual subjects cannot change that access.
Point to Point Protocol
The Internet standard for transmission of IP packets over a serial line, as in a dial-up connection to an ISP.
Remote Access Server (RAS)
A combination of hardware and software used to enable remote access to a network.
Role-based Access Control
An access control mechanism in which, a set of roles that the user may perform depends on access.
Rule-Based Access Control
Access Control mechanism based on rules
Security Association (SA)
An instance of security policy and keying material applied to a specific data flow.
Virtual Private Network (VPN)
An encrypted network connection across another network offering a private communication channel.
Ping sweep
sends a ping (an Internet Control Message Protocol ICMP) echo request to the target machine.
smurf attack
attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network.
TCP/IP Hijaking
taking control of an already existing session between a client and server.
Malware
refers to software designed for nefarious
purposes.
certificate
A cryptographically signed object that contains an identity and a public key associated with this identity.
certificate authority
An entity responsible for issuing and revoking certificates.
Certificate Revocation List
A digitally signed object that lists all of the current but revoked certificates issued by a given certification authority.
Internet Security Association and Key Management Protocol
A protocol framework that defines the mechanics of implements a key exchange protocol and negotiation of a security policy.
Point-to-Point Tunneling Protocol
allows the encapsulation of one packet inside another to hid the original packet
Pretty Good Privacy
A popular encryption program that has the ability to encrypt and digitally sign email and files
Public Key Infrastructure
Infrastructure for binding a public key to a known user through a trusted intermediary, typically a CA
secure multipurpose internet mail extension
An encrypted implementation of the MIME protocol specification
Secure Socket Layer (SSL)
An encryption layer between the session and transport layer
Transport Layer Security
a newer form of SSL
Wired Equivalent Privacy
Encryption scheme used to attempt to provide confidentiality and data integrity on 802.11 networks
Wireless Application Protocol
A protocol for transmitting data to small handheld devices such as cell phones
Wireless Transport Layer Security
The encryption protocol used on WAP networks
X.509
The standard format for digital certificates