Day 15 COPY Flashcards
The obfuscation of information within a common looking format that achieves stealth.
Stego
Stenography
Four pairs of wires wrapped in foil that is grounded to prevent interference and eavesdropping.
STP
Shielded Twisted Pair
The use of a single value to hide and then reveal information.
Symmetric Key
Secret Key
A system used by enterprises to protect the intranet from hostile or unsecured traffic, commonly implemented in a cloud-based solution.
SWG
Secure Web Gateway
This was initially used by Cisco as centralized authentication for its routers and switches.
TACACS+
Terminal Access Controller Access Control System Plus
This defines four different services (discovery, collection, inbox and polling) for the purpose of sharing intelligence and threat information between organizations.
TAXII
Trusted Automated eXchange of Indicator Information
An upper layer protocol that requires handshakes, acknowledgments and a graceful close.
TCP
Transmission Control Protocol
It is a command Linux based network analysis tool.
TCPDump
Wireshark alternative
This is returned after a user successfully. Authenticates to a KDC.
TGT
Ticket Granting Ticket
A protocol for key management and change used by WPA.
TKIP
Temporal Key Integrity Protocol
This is now incorporated into HTTPS and allows for AES and other more recent cryptographic algorithms.
TLS
Transport Layer Security
A physical token-based authentication system with an access code that changes regularly.
TOTP
Time-based One-time Password
A cryptographic chipset that contains key information to allow encryption and ensure device integrity.
TPM
Trusted Platform Module
This is a methodology of approaching a target by disguising one thing or activity is something trustworthy to achieve insertion.
Trojan
Trojan horse
The component of the name resolution message that performs authentication in DNSSEC.
TSIG
Transaction Signature