D Glossary Flashcards
Deauthentication Attack
Type of attack where attackers force wireless stations to reauthenticate in order to gather the full association handshake
Debugger
A software program that can be used to analyze programs, may even reverse engineer the software to understand its functionality
Defense In Depth
Multiple layers of security controls used to discourage or slow down attackers, keeping them from getting to the core of the network
DHCP
Used to provide IP address and other configurations to a host
Dynamic Host Configuration Protocol
Diffie - Hellman
Mechanism where 2 parties mutually derive an encryption key without exposing the key
Disassembly
converting an executable program to assembly language to make it slightly more readable
DNS
Used to resolve hostnames to IP addresses and vice versa and provide other info associated with a domain
Domain Name System