Glossary J-K-L-M Flashcards
jamming
An attack in which radio waves disrupt 802.11 wireless signals.
job rotation
The policy of preventing any one individual performing the same role or tasks for too long. This deters fraud and provides better oversight of the person’s duties.
jump server
A hardened server that provides access to other hosts. Also known as jumpbox.
Kerberos
A single sign-on authentication and authorization service that is based on a time-sensitive ticket-granting system.
keylogger
Malicious software or hardware that can record user keystrokes.
kill chain
A model developed by Lockheed Martin that describes the stages by which a threat actor progresses a network intrusion.
L2TP (Layer 2 Tunneling Protocol)
VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP, Frame Relay, or ATM.
lateral movement
The process by which an attacker is able to move from one part of a computing environment to another.
LDAP (Lightweight Directory Access Protocol)
A network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.
LDAP injection
An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user input.
LDAPS (Lightweight Directory Access Protocol Secure)
A method of implementing LDAP using SSL/TLS encryption.
LEAP (Lightweight Extensible Authentication Protocol)
Cisco Systems’ proprietary EAP implementation.
least privilege
A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.
lightweight cryptography
Cryptographic algorithms with reduced compute requirements that are suitable for use in resource-constrained environments, such as battery-powered devices.
LLR (lessons learned report)
An analysis of events that can provide insight into how to improve response processes in the future. Also known as after action report or AAR.
load balancer
A type of switch or router that distributes client requests between different resources, such as communications links or similarly-configured servers. This provides fault tolerance and improves throughput.
logger command
Linux utility that writes data to the system log
logic bomb
A malicious program or script that is set to run under particular circumstances or in response to a defined event.
loop protection
If broadcast traffic is allowed to continually loop around a network, the number of broadcast packets increases exponentially, crashing the network. Loop protection in switches (such as Spanning Tree Protocol), and in routers (Time To Live for instance) is designed to prevent this.
MaaS (monitoring as a service)
Cloud service providing ongoing security and availability monitoring of on-premises and/or cloud-based hosts and services.
MAC (Mandatory Access Control)
Access control model where resources are protected by inflexible, system defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).