Day 8 Flashcards
Protects a private or secret key from unauthorized access or disclosure.
KEK
Key Encryption Key
Filter and forward data at the MAC layer.
L2 Device
Switch
Supports VPN site to site connections but does not encrypt.
L2TP
Layer 2 Tunneling Protocol
This is an infrastructure device that interconnects networks and can span different technologies.
L3 Device
Router
A network composed of relatively short-range protocols that facilitate swift transfer of information.
LAN
Local Area Network
This is a protocol designed to work with AD or NDS information from a tree.
LDAP
Lightweight Directory Access Protocol
Commonly integrated with Cisco systems to facilitate centralized authentication.
LEAP
Lightweight Extensible Authentication Protocol
A category of malicious activity, wherein an authorized user adds unwanted instructions.
Logic Bomb
Insider alteration
The staging of general purpose or security management systems on the cloud that manage local agent-based systems.
MaaS
Monitoring as a Service
This is typified by a network interface card, along with its unique burned in identifying number.
MAC
Media Access Control
A strict form of access control that prevents subjects from accessing objects above their security level.
MAC
Mandatory Access Control
A small piece of information sent along with a message that validates the sender.
MAC
Message Authentication Code
Management software designed to allow an enterprise to maintain control over its mobile devices, smart phones and tablets.
MAM
Mobile Application Management
A general description of a technology that allows access across entire municipal areas.
MAN
Metropolitan Area Network
An access point to a physical organization designed to regulate inbound and outbound access.
Mantrap
Screening area
A pointer to an area on the disk where initial loading information is stored.
MBR
Master Boot Record
One of the oldest hashing algorithms.
MD5
Message Digest 5
This is the centralized connection point between intermediate distribution frames and the outside world.
MDF
Main Distribution Frame
Software that centrally controls the security aspects and configuration of smart phones.
MDM
Mobile Device Management
Requiring the use of two or more of location, something you know, have, are or do.
MFA
Multi-Factor Authentication
Office equipment, typically a printer, that is able to fax, photocopy and scan documents.
MFD
Multifunction Device
A printer that can fax, photocopy and scan documents.
MFP
Multifunction Printer
An attacker insinuates itself between a client and a server, observing or modifying communication.
MITM
Man-in-the-Middle
On-Path attack wherein a node listens to and takes over a conversation by insinuating itself in the stream of communication.
MITM
Man in the middle
A component of artificial intelligence that enables a system to learn, adapt and improve based upon inputs without having to be reprogrammed.
ML
Machine Learning
A protocol intended to facilitate multimedia transfer over SMS.
MMS
Multimedia Message Service
This is a document that describes the cooperative work to be taken together by two parties toward an objective.
MOA
Memorandum of Agreement
This provides terms and details necessary for two
parties to work together.
MOU
Memorandum of Understanding