Glossary N-O Flashcards

1
Q

NAC (network access control)

A

A general term for the collected protocols, policies, and hardware that authenticate and authorize access to a network at the device level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

narrow-band

A

Low-power cellular networks designed to provide data connectivity to IoT devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NAT (network address translation)

A

A routing mechanism that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-routable addresses internally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ncat

A

Utility for reading and writing raw data over a network connection. Also known as netcat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NDA (non-disclosure agreement)

A

An agreement that stipulates that entities will not share confidential information, knowledge, or materials with unauthorized third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nessus

A

One of the best-known commercial vulnerability scanners, produced by Tenable Network Security. Also known as Tenable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Netflow

A

A Cisco-developed means of reporting network flow information to a structured database. NetFlow allows better understanding of IP traffic flows as used by different network applications and hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NFC (Near Field Communication)

A

A standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances, facilitating contactless payment and similar technologies. NFC is based on RFID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NFV (network functions virtualization)

A

Provisioning virtual network appliances, such as switches, routers, and firewalls, via VMs and containers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NGFW (next generation firewall)

A

Advances in firewall technology, from app awareness, user-based filtering, and intrusion prevention to cloud inspection. Also known as layer 7 firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nmap

A

Versatile port scanner used for topology, host, service, and OS discovery and enumeration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

nonce

A

An arbitrary number used only once in a cryptographic communication, often to prevent replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

non-repudiation

A

The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

normalization

A

A routine that applies a common consistent format to incoming data so that it can be processed safely. Normalization is referred to in the context of log collection and software coding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTLM authentication (NT LAN Manager authentication)

A

A challenge-response authentication protocol created by Microsoft for use in its products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

nxlog

A

Software optimized for multi-platform log collection and aggregation.

17
Q

OATH (Initiative for Open Authentication)

A

An industry body comprising the main PKI providers, such as Verisign and Entrust, that was established with the aim of developing an open, strong authentication framework.

18
Q

OAuth (Open Authorization)

A

Standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider.

19
Q

obfuscation

A

A technique that essentially “hides” or “camouflages” code or other information so that it is harder to read by unauthorized users.

20
Q

OCSP (online certificate status protocol)

A

Allows clients to request the status of a digital certificate, to check whether it is revoked.

21
Q

offboarding

A

The process of ensuring that all HR and other requirements are covered when an employee leaves an organization. Also known as exit interview.

22
Q

offline CA (offline certificate authority)

A

In PKI, a CA (typically the root CA) that has been disconnected from the network to protect it from compromise.

23
Q

OICD (OpenID Connect)

A

An authentication layer that sits on top of the OAuth 2.0 authorization protocol.

24
Q

OID (object identifier)

A

Numeric schema used for attributes of digital certificates. onboarding The process of bringing in a new employee, contractor, or supplier.

25
Q

OOB (out-of-band management)

A

Accessing the administrative interface of a network appliance using a separate network from the usual data network. This could use a separate VLAN or a different kind of link, such as a dial-up modem.

26
Q

Opal

A

Standards for implementing device encryption on storage devices. operational control A category of security control that is implemented by people.

27
Q

orchestration

A

The automation of multiple steps in a deployment process. order of volatility The order in which volatile data should be recovered from various storage locations and devices after a security incident occurs.

28
Q

OSINT (open-source intelligence)

A

Publicly available information plus the tools used to aggregate and search it.

29
Q

OT (operational technology)

A

A communications network designed to implement an industrial control system rather than data networking.

30
Q

OTA (over the air)

A

A firmware update delivered on a cellular data connection. output encoding Coding methods to sanitize output created from user input.

31
Q

OWASP (Open Web Application Security Project)

A

A charity and community publishing a number of secure application development resources.