Security + Terminology Flashcards
Ensures that resources are only granted to those users who are entitled to them
Access Control
A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource
Access Control List (ACL)
A security service that provides protection of a system resource against unauthorized access. The two basic mechanisms for implementing this service are ACLs and tickets
Access Control Service
Management is the maintenance of access information which consists of four: account, administration, maintenance, monitoring, and revocation
Access Management Access
Is the process of collecting all the legitimate account names on a system
Account Harvesting
Is that practice of sending an ACK inside another packet going to the same destination
ACK Piggybacking
Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user’s workstation. Ex. Java, ActiveX
Active Content
A standard being developed by NIST. Intended to specify an unclassified, publicly-disclosed, symmetric encryption algorithm
Advanced Encryption Standard (AES)
A finite step-by-step instructions for a problem-solving or computation procedure, especially on that can be implemented by a computer
Algorithm
A pioneer packet-switched network that was built in the early 1970’s under contract to the US government
APRANET - Advanced Research Projects Agency Network
Is the process of confirming the correctness of the claimed identity
Authentication
Commonly used to mean the capacity of a communication channel to pass data through the channel in a given amount of time. Usually expressed in bits per second
Bandwidth
Is the simplest web-based authentication scheme that works by sending the username and password with each request
Basic Authentication
Use physical characteristics of the users to determine access
Biometrics
The smallest unit of information stronger; a contraction of the term “binary digit’ on of the two symbols
Bit
Encrypts one block of data at a time
Block Cipher
The people who perform defensive cybersecurity tasks, including placing and configuring firewalls, implementing patching programs, enforcing strong authentication, ensuring physical security measures are adequate and a long list of similar undertakings
Blue Team
Is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack
Botnet
A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one
Brute Force
Occurs when a program tries to store more data in a buffer than it was intended to hold
Buffer Overflow
A fundamental unit of computer storage; the smallest addressable unit in a computer’s architecture. Usually holds one character of information and usually means eight bits
Byte
A special high-speed storage mechanism. It can be either a reserved section of main memory or an independent high-speed storage device
Cache
Is a unit of data transmitted over an ATM network
Cell
Is the use of SSL and certificates to authenticate and encrypt HTTP traffic
Certificate-Based Authentication