Definitions Flashcards
IV
Initialization Vector
MFDs
Multi-Functional Devices - Print / Scan / Copy
MMS
Multimedia Messaging Service - Extention of SMS / Supports sending multimedia content
NIDS
Network Based Intrusion Detection System
MTBF
Mean Time Between Failures
RADIUS
Remote Authentication Dial-In User Service - Central authentication service alternatives: TACACS+ and Diameter
PKI
Public Key Infrastructure
PSK
Pre-Shared Key
NIPS
Network Based Intrusion Prevention System - Placed in-line or in-band
POP3
Post Office Protocol Version 3
IMAP4
Internet Message Protocol Version 4
Protocol used to store and manage email on servers
TCP 143
CSR
Certificate Signing Request
CTM
Counter Mode
Mode of operations used for encryption
Combines an IV with a Counter
VPN
Virtual Private Network
WAF
Web Application Firewall
DLP
Data Loss Prevention
DMZ
DeMilitarized Zone
CHAP
Challenge Handshake Authentication Protocol
DLL
Dynamic Link Library
SOPs
Standard Operating Procedures
NAC
Network Access Control
Two types - Permanent and Dissolvable
NAT
Network Address Translation
EAP
Extensible Authentication Protocol
Authentication frame work that provides general guidance for authentication methods.
Variations: PEAP, EAP-TLS, EAP–TTLS and EAP-FAST
SLE
Single Loss Expectancy
SLA
Service Level Agreement
MDM
Mobile Device Management
RAT
Remote Access Trojan
Control a system from a remote location
RC4
Rivest Cipher version 4
A symetric stream cipher that can use between 40 and 2,048 bits
Known to be cracked (obsolete)
DOS
Denial of Service
Disk Operating System
MITM
Man in the Middle
MD5
Message Digest 5
Hashing function for integrity
128 bit hashes referred as MD5 checksums
HSM
Hardware Security Module
HVAC
Heating Ventilation and Air Conditioning
MTTR
Mean Time To Recover
The time it takes to restore a failed system
SSL
Secure Socket Layer
Predecessor to TLS
XOR
Logical operation used in some encryption schemes
XML
Extensible Markup Language
3DES
Triple Data Encryption Standard
Symetric Algorithm
Block Cipher
64 bit blocks
SDN
Software Defined Networks
SDN’s separate the data and control planes
HOTP
HMAC Based One Time Password
WPS
WiFi Protected Setup
RSA
Rivest Shamir and Adleman
Asymmetric algorithm used to encrypt data and digitally sign transmissions
WPA2
WiFi Protected Access 2
Supports CCMP for encryption which is based on AES
WPA
WiFi Protected Access
Superseded by WPA2
This is obsolete DO NOT USE
ARP
Address Resolution Protocol
BIOS
Basic Input Output System
RFID
Radio Frequency Identification System
RFID Attacks:
Eavesdropping
Replay
DOS (Denial of Service)
FAR
False Acceptance Rate
SHA
Secure Hash Algorithm
SFTP
Secure File Transfer Protocol
Extension of Secure Shell (SSH) used to encrypt FTP traffic.
Transmits data using TCP port 22
STP
Spanning Tree Protocol
SMS
Short Message Service
AP
Access Point
DH
Diffie-Hellman
Asymmetric Algorithm used to privately share symmetric keys.
XSS
Cross Site Scripting
TLS
Transport Layer Security
FRR
False Reject Rate
RAID
Redundant Array of Inexpensive Disks
BYOD
Bring Your Own Device
SSH
Secure Shell
Uses TCP Port 22
NTLM
New Technology Lan Manager
Suite of protocols that provide confidentiality, integrity and authentication within windows systems.
Versions:
NTLM, NTLMv2 and NTLM2 Session
FAR
False Acceptance Rate
IaaS
Infrastructure as a Service
NDA
Non Disclosure Agreement
AES
Advanced Encryption Standard
Strong symmetric block cipher. Encrypts in 128 bit blocks
Key sizes of 128, 192 or 256
ACL’s
Access Control Lists
ISA
Interconnect Security Agreement