M-T Flashcards
Media access control (MAC) address
A unique identifier assigned to network interfaces for communications on the physical network segment.
MAC header
represents the hardware address of an network interface controller (NIC) inside a data packet.
Mail relay server
An electronic mail (email) server that relays messages so that neither the sender nor the recipient is a local user.
Mandatory access control (MAC)
a means of restricting access to data based on varying degrees of security requirements for information contained in the objects and the corresponding security clearance of users or programs acting on their behalf.
Man-in-the-middle attack
an attack strategy in which the attacker intercepts the communication stream between two parts of the victim system and then replaces the traffic between the 2 components with the intruder’s own, eventually assuming control of the communication.
masking
a computerized technique of blocking of the display of sensitive information, such as passwords, on a computer terminal or report.
Message authentication code
An American National Standards Institute (ANSI) standard checksum that is computed using Data Encryption Standard (DES).
Message digest
A smaller extrapolated version of the original message created using a message digest algorithm.
Message digest algorithm
Message digest algorithms are SHA1, MD2, MD4, and MD5. These algorithms are one-way functions unlike private and public key encryption algorithms. All digest algorithms take a message of arbitrary length and produce a 128-bit message digest.
Metropolitan area network (MAN)
A data network intended to serve an area the size of a large city.
Miniature fragment attack
Using this method, an attacker fragments the IP packet into smaller ones and pushes it through the firewall, in the hope that only the first of the sequence of fragmented packets would be examined and the others would pass without review.
Mirrored site
An alternate site that contains the same information as the original. Mirrored sites are set up for backup and disaster recovery and to balance the traffic load for numerous download requests. Such download mirrors are often placed in different locations throughout the Internet.
Multifactor authentication
A combination of more than one authentication method
National Institute for Standards and Technology (NIST)
Develops tests, test methods, reference data, proof-of concept implementations, and technical analyses to advance the development and productive user of IT. NIST is a US govt entity that creates mandatory standards that are followed by federal agencies and those doing business with them.
Network basic input/out system (NetBIOS)
A program that allows applications on different computers to communicate within a local area network (LAN)
Network address translation (NAT)
A methodology of modifying network address information in datagram packet headers while they are in transit across a traffic routing device for the purpose of remapping one IP address space into another.
Network interface card (NIC)
A communication card that when inserted into a computer, allows it to communicate with other computers on a network. Most NICs are designed for a particular type of network or protocol.
Network news transfer protocol (NNTP)
Used for the distribution, inquiry, retrieval, and posting of Netnews articles using a reliable stream-based mechanism. For news-reading clients, nnTP enables retrieval of news articles that are stored in a central database, giving subscribers the ability to select only those articles they wish to read.
Network segmentation
A common technique to implement network security is to segment an organization’s network into separate zones that can be separately controlled, monitored and protected.
Network traffic analysis
Identifies patterns in network communications. Traffic analysis does not need to have the actual content of the communication but analyzes where traffic is taking place, when and for how long communications occur and the size of information transferred.
Nonintrusive monitoring
use of transported probes or traces to assemble information, track traffic and identify vulnerabilities.