Day 8 Reversed Flashcards
KEK
Key Encryption Key
Protects a private or secret key from unauthorized access or disclosure.
L2 Device
Switch
Filter and forward data at the MAC layer.
L2TP
Layer 2 Tunneling Protocol
Supports VPN site to site connections but does not encrypt.
L3 Device
Router
This is an infrastructure device that interconnects networks and can span different technologies.
LAN
Local Area Network
A network composed of relatively short-range protocols that facilitate swift transfer of information.
LDAP
Lightweight Directory Access Protocol
This is a protocol designed to work with AD or NDS information from a tree.
LEAP
Lightweight Extensible Authentication Protocol
Commonly integrated with Cisco systems to facilitate centralized authentication.
Logic Bomb
Insider alteration
A category of malicious activity, wherein an authorized user adds unwanted instructions.
MaaS
Monitoring as a Service
The staging of general purpose or security management systems on the cloud that manage local agent-based systems.
MAC
This is typified by a network interface card, along with its unique burned in identifying number.
Media Access Control
MAC
A strict form of access control that prevents subjects from accessing objects above their security level.
Mandatory Access Control
MAC
A small piece of information sent along with a message that validates the sender.
Message Authentication Code
MAM
Mobile Application Management
Management software designed to allow an enterprise to maintain control over its mobile devices, smart phones and tablets.
MAN
Metropolitan Area Network
A general description of a technology that allows access across entire municipal areas.
Mantrap
Screening area
An access point to a physical organization designed to regulate inbound and outbound access.
MBR
Master Boot Record
A pointer to an area on the disk where initial loading information is stored.
MD5
Message Digest 5
One of the oldest hashing algorithms.
MDF
Main Distribution Frame
This is the centralized connection point between intermediate distribution frames and the outside world.
MDM
Mobile Device Management
Software that centrally controls the security aspects and configuration of smart phones.
MFA
Multi-Factor Authentication
Requiring the use of two or more of location, something you know, have, are or do.
MFD
Multifunction Device
Office equipment, typically a printer, that is able to fax, photocopy and scan documents.
MFP
Multifunction Printer
A printer that can fax, photocopy and scan documents.
MITM
Man-in-the-Middle
An attacker insinuates itself between a client and a server, observing or modifying communication.
On-Path attack wherein a node listens to and takes over a conversation by insinuating itself in the stream of communication.
ML
Machine Learning
A component of artificial intelligence that enables a system to learn, adapt and improve based upon inputs without having to be reprogrammed.
MMS
Multimedia Message Service
A protocol intended to facilitate multimedia transfer over SMS.
MOA
Memorandum of Agreement
This is a document that describes the cooperative work to be taken together by two parties toward an objective.
MOU
Memorandum of Understanding
This provides terms and details necessary for two
parties to work together.