Lesson 7: Security Flashcards
Access Lists (ACLs)
A basic form of firewall protection
AES
Advanced Encryption Standard
AH
Authentication Header
Brute Force Attack
Attacker uses every possible combination of characters for the password
Buffer Overflow
Happens when a program tries to put more data into a buffer than it was configured to hold
netstat -a -b
(a) Command used to display the ports currently open on a Windows operating system and (b) used to display the executable involved in creating the connection or listening port
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
CHAP
Challenge Handshake Authentication Protocol
Demilitarized Zones (DMZs)
Used to isolate the servers
Denial of Service (DoS)
A service is being denied to a computer, network, or server
DES, 3DES
Data Encryption Standard, Triple Data Encryption Standard
Dictionary Attack
Uses known passwords and many variations (upper and lowercase and combinations) to try to log in to your account
Diffie-Hellman
Key generation algorithm
Directed Broadcast
The broadcast is sent to a specific subnet
ESP
Encapsulating Security Protocol
Firewall
Used in computer networks for protecting the network
Fraggle
A DoS attack in which spoofed UDP packets are sent to a network’s broadcast address
GRE
Generic Routing Encapsulation
IKE
Internet Key Exchange