Security + Terminology Flashcards

1
Q

Ensures that resources are only granted to those users who are entitled to them

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security service that provides protection of a system resource against unauthorized access. The two basic mechanisms for implementing this service are ACLs and tickets

A

Access Control Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Management is the maintenance of access information which consists of four: account, administration, maintenance, monitoring, and revocation

A

Access Management Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is the process of collecting all the legitimate account names on a system

A

Account Harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is that practice of sending an ACK inside another packet going to the same destination

A

ACK Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user’s workstation. Ex. Java, ActiveX

A

Active Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A standard being developed by NIST. Intended to specify an unclassified, publicly-disclosed, symmetric encryption algorithm

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A finite step-by-step instructions for a problem-solving or computation procedure, especially on that can be implemented by a computer

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A pioneer packet-switched network that was built in the early 1970’s under contract to the US government

A

APRANET - Advanced Research Projects Agency Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is the process of confirming the correctness of the claimed identity

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Commonly used to mean the capacity of a communication channel to pass data through the channel in a given amount of time. Usually expressed in bits per second

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is the simplest web-based authentication scheme that works by sending the username and password with each request

A

Basic Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use physical characteristics of the users to determine access

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The smallest unit of information stronger; a contraction of the term “binary digit’ on of the two symbols

A

Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encrypts one block of data at a time

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The people who perform defensive cybersecurity tasks, including placing and configuring firewalls, implementing patching programs, enforcing strong authentication, ensuring physical security measures are adequate and a long list of similar undertakings

A

Blue Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one

A

Brute Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Occurs when a program tries to store more data in a buffer than it was intended to hold

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A fundamental unit of computer storage; the smallest addressable unit in a computer’s architecture. Usually holds one character of information and usually means eight bits

A

Byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A special high-speed storage mechanism. It can be either a reserved section of main memory or an independent high-speed storage device

A

Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Is a unit of data transmitted over an ATM network

A

Cell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is the use of SSL and certificates to authenticate and encrypt HTTP traffic

A

Certificate-Based Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Uses a challenge/response authentication mechanism where the response varies every challenge to prevent replay attacks
Challenge-Handshake Authentication Protocol (CHAP)
26
A value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data
Checksum
27
A cryptographic algorithm for encryption and decryption
Cipher
28
Is the encrypted form of the message being sent
Ciphertext
29
A system entity that requests and uses a service provided by another system entity, called a "server." In some cases, the server may itself be a client of some other server
Client
30
Utilization of remote servers in the data-center of cloud provider to store, manage, and process your data instead of using local computer systems
Cloud Computing
31
Contains fully redundant hardware and software, with telecommunications, telephone and utility connectivity
Hot Site
32
It contains partially redundant hardware and software, with telecommunications and telephone but not all primary site operations
Warm
33
Hardware is ordered, shipped and installed, and software is loaded
Cold Site
34
Occurs when multiple systems transmit simultaneously on the same wire
Collision
35
A collection of host computers together with the sub-network or inter-network through which they can exchange data
Computer Network
36
Is the need to ensure that information is disclosed only to those who are authorized to view it
Confidentiality
37
Is the ability to get a more complete picture of the information by analyzing several different types of records at once
Data Aggregation
38
Is the entity currently using or manipulating the data, and therefore temporarily taking responsibility for the data
Data Custodian
39
A widely-used method of data encryption using a private key
Data Encryption Standard (DES)
40
Is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack
Decapsulation
41
The prevention of authorized access to a system resource or the delaying of system operations and functions
Denial of Service
42
A key agreement algorithm published in 1976, does key establishment, not encryption
Diffie-Hellman
43
Is an electronic "credit card" that establishes your credentials when doing business or other transactions on the web
Digital Certificate
44
Is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission
Digital Signature
45
An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers
Digital Signature Algorithm (DSA)
46
Is the process of recovery of IT systems in the event of a disruption or disaster
Disaster Recovery Plan (DRP)
47
A sphere of knowledge, or a collection of facts about some program entities or a number of network points or addresses, etc.
Domain
48
Is an attack by which an attacker takes over a domain by first blocking access to a domain's DNS server and then putting his own server up in its place
Domain Hijacking
49
Is the way that Internet domain names are located and translated into Internet Protocol addresses
Domain Name System (DNS)
50
Listening to a private conversation which may reveal information which can provide access to a facility or network
Eavesdropping
51
Is the response a machine that has received an echo request sends over ICMP
Echo Replay
52
The inclusion of one data structure within another structure so that the first data structure is hidden for the time being
Encapsulation
53
Cryptographic transformation of data (plaintext) into a form (cipher text) that conceals the data's original meaning to prevent it from being known or used
Encryption
54
The most widely-installed LAN technology. Specified in a standard, IEEE 802.3
Ethernet
55
A framework that supports multiple, optional authentication mechanisms for PPP, including clear text passwords, challenge-response, and arbitrary dialog sequences
Extensible Authentication Protocol (EAP)
56
A protocol which distributes routing information to the routers which connect autonomous systems
Exterior Gateway Protocol (EGP)
57
A TCP/IP protocol specifying the transfer of text or binary files across the network
File Transfer Protocol (FTP)
58
A logical or physical discontinuity in a network to prevent unauthorized access to data or resources
Firewall
59
Set in the Active Directory domains that replicate their databases with each other
Forest
60
The process of storing a data file in several "chunks" or fragments rather than in a single contiguous sequence of bits in one place on the storage medium
Fragmentation
61
The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities. Also "regression testing"
Fuzzing
62
A network point that acts as an entrance to another network
Gateway
63
Is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed
GNU
64
The process of identifying and fixing vulnerabilities on a system
Hardening
65
Are used to generate a one way "check sum" for a larger text, which is not trivially reversed
Hash Functions
66
Is the extra information in a packet that is needed for the protocol stack to process the packet
Header
67
A form of active wiretapping in which the attacker seizes control of a previously established communication association
Hijack Attack
68
Programs that simulate one or more network services that you designate on your computers ports
Honey Pot
69
Any computer that has full two-way access to other computers on the Internet. Or a computer with a web server that serves the pages for one or more web sites
Host
70
Systems use information from the operating system audit records to watch all operations occurring on the host that intrusion detection software has been installed upon
Host-Based Intrusion Detection
71
Is a server that acts as a middleman in the communication between HTTP clients and servers
HTTP Proxy
72
When used in the first part of a URL. This term specifies the use of HTTP enhanced by security mechanism, which is usually SSL
HTTPS
73
Is a network device that operates by repeating data that it receives on one port to all other ports. As a result, data transmitted by one host is retransmitted to all other hosts on the hub
Hub
74
Builds on the dictionary attack method by adding numerals and symbols to dictionary words
Hybrid Attach
75
An application of cryptography that combines two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption
Hybrid Encryption
76
In hypertext or hypermedia, an information object that points to related information that is located elsewhere and can be retrieved by activating a link
Hyperlink
77
The set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page
Hypertext Markup Language (HTML)
78
The protocol in the Internet Protocol (IP) family used to transport hypertext documents across an internet
Hypertext Transfer Protocol (HTTP)
79
As an adverse network event in an information system or network or the threat of the occurrence of such an event
Incident
80
Rely on the user to make logical connections between seemingly unrelated pieces of information
Inference Attack
81
Is the competition between offensive and defensive players over information resources
Information Warfare
82
Are where an attacker intentionally send unusual input in the hopes of confusing an application
Input Validation Attacks
83
Is the need to ensure that information has not been changed accidentally or deliberately, and that it is accurate and complete
Integrity
84
An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the stat of the IP network
Internet Control Message Protocol (ICMP)
85
A protocol that defines how a client should fetch mail from and return mail to a mail server.
Internet Message Access Protocol (IMAP)
86
The method or protocol by which data is sent from one computer to another on the Internet
Internet Protocol (IP)
87
A developing standard for security at the network or packet processing layer of network communication
Internet Protocol Security (IPsec)
88
A computer network, especially one based on Internet technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders
Intranet
89
A security management system for computers and networks. Gathers and analyzes information from various areas within a computer or a network identify possible security breaches, which include intrusions and misuse
Intrusion Detection
90
A computers inter-network address that is assigned for use by the Internet Protocol and other protocols.
IP Address
91
A denial of service attack that sends a host more echo request ("ping") packets than the protocol implementation can handle
IP Flood
92
Is an Operating System option that allows a host to act as a router. A system that has more than 1 network interface
IP Forwarding
93
A voluntary, non-treaty, non-government organization, established in 1947, with voting members that are designated standards bodies of participating nations and non-voting observer organizations
ISO - International Organization for Standardization
94
A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, peer entity authentication service and access control service distributed in a client-server network environment
Kerberos
95
The essential center of a computer operating system, the core that provides basic services for all other parts of the operating system.
Kernel
96
An Internet Protocol (originally developed by Cisco) that uses tunneling of PPP over IP to create a virtual extension of a dial-up link across a network
Layer 2 Forwarding Protocol (L2F)
97
An extension of the Point-to-Point Tunneling Protocol used by an Internet service provider to enable the operation of a virtual private network over the Internet
Layer 2 Tunneling Protocol (L2TP)
98
Is the principle of allowing users or applications the least amount of permissions necessary to perform their intended functions
Least Privilege
99
A software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network, whether on the public Internet or on a corporate Intranet
Lightweight Directory Access Protocol (LDAP)
100
Associates a list of users and their privileges with each other
List Based Access Control
101
Allow for the adding of additional functionality directly into the kernel while the system is running
Loadable Kernel Modules (LKM)
102
Are programs or snippets of code that execute when a certain predefined event occurs. May also be set to go off on a certain date or when a specified set of circumstances occur
Logic Bombs
103
Is an elementary building block of a digital circuit. Have two inputs and one output.
Logic Gate
104
A physical address; a numeric value that uniquely identifies that network device from every other device on the planet
MAC Address
105
Software that appears to perform a useful or desirable function; but actually gains authorized access to system resources or tricks a user into executing other malicious logic
Malicious Code
106
A generic term for a number of different type of malicious code
Malware
107
Is where the system controls access to resources based on classification levels assigned to both the objects and the users
Mandatory Access Control (MAC)
108
Type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other
Man-in-the-Middle Attack (MitM)
109
A worm program written by Robert T. Morris, Jr. that flooded the ARPANET in November 1988, causing problems for thousands of hosts
Morris Worm
110
Broadcasting from one host to a given set of hosts
Multi-Cast
111
To combine multiple signals from possibly disparate sources, in order to transmit them over a single path
Multiplexing
112
It is used to share one or a small number of publicly routable IP addresses among larger number of hosts
NAT - Network Address Translation
113
A unit of the US Commerce Department. Formerly known as the National Bureau of Standards
National Institute of Standards and Technology (NIST)
114
Any act of God that disables a system component
Natural Disaster
115
Translation of an Internet Protocol address used within one network to a different IP address known within another network. One network is designated the inside network and the other is the outside
Network Address Translation
116
To compile and electronic inventory of the systems and the services on your network
Network Mapping
117
Are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices
Network Taps
118
Monitors the traffic on its network segment as a data source. Generally accomplished by placing the network interface card in promiscuous mode to capture all network traffic that crosses its network segment
Network-Based IDS
119
Is the ability for a system to prove that a specific user and only that specific user sent a message and that it hasn't been modified
Non-Repudiation
120
A sequence of eight bits. Is an eight-bit byte
Octet
121
Irreversible transformation of plaintext to cipher text, such that the plaintext cannot be recovered from the cipher text by other than exhaustive procedures even if the cryptographic key is known
One-Way Encryption
122
A (mathematical) function, f, which is easy to compute the output based on a given input. However given only the output values it is impossible (except for a brute force attack) to figure out what the input value is
One-Way Function
123
Is a standard description or "reference model" for how messages should be transmitted between any two points in a telecommunication network
OSI - Open Systems Interconnection
124
Is that the process of communication between two end points in a telecommunication network can be divided into layers
OSI Layers
125
Hindrance of system operation by placing excess burden on the performance capabilities of a system component
Overload
126
A piece of a message transmitted over a packet-switching network. One of the key features of a packet is that it contains the destination address in addition to the data
Packet
127
Is where individual packets each follow their own paths through the network from one endpoint to another
Packet Switched Network
128
Is a simple, weak authentication mechanism where a user enters the password and it is then sent across the network, usually in the clear
Password Authentication Protocol (PAP)
129
Is the process of attempting to guess passwords, given the password file information
Password Cracking
130
Passive wiretapping, usually on a local area network, to gain knowledge of passwords
Password Sniffing
131
Is a small update released by a software manufacturer to fix bugs in existing programs
Patch
132
Is the process of updating software to a different version
Patching
133
Is the actual application data a packet contains
Payload
134
Gaining unauthorized logical access to sensitive data by circumventing a system's protections
Penetration
135
Is used to test the external perimeter security of a network or facility
Penetration Testing
136
Keeps the same letters but changes the position within a text to scramble the message
Permutation
137
Are those firewalls that are installed and run individual's PCs
Personal Firewalls
138
More sophisticated form of MITM attack. User's session is redirected to a masquerading website. This can be achieved by corrupting a DNS server on the Internet and pointing a URL to the masquerading websites
Pharming
139
The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website
Phishing
140
An attack that send an improperly large ICMP echo request packet with the intent of overflowing the input buffers of the destination machine and causing it to crash
Ping of Death
141
Looks for machines that are responding to ICMP Echo Requests
Ping Scan
142
An attack that send ICMP echo requests to a range of IP addresses, with the goal of finding hosts that can be probed for vulnerabilities
Ping Sweep
143
Ordinary readable text before being encrypted into ciphertext or after being decrypted
Plaintext
144
A protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server
Point-to-Point Protocol (PPP)
145
A protocol that allows corporations to extend their own corporate network through private "tunnels" over the public Internet
Point-to-Point Tunneling Protocol (PPTP)
146
Is nothing more than a integer that uniquely identifies an endpoint of a communication stream. Only one process per machine can listen on the same port number
Port
147
Is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a "well known" port number, the computer provides
Port Scan
148
Is the holding, control and ability to use information
Possession
149
An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client
Post Office Protocol, Version 3 (POP3)
150
Trademark of Network Associates, Inc. referring to a computer program that uses cryptography to provide data security for electronic mail and other applications on the Internet
Pretty Good Privacy (PGP)TM
151
Is a piece of malware that attaches itself to existing program files
Program Policy
152
Is that information unique to a company and its ability to compete, such as customer lists, technical data, product costs, and trade secrets
Proprietary Information
153
A formal specification for communicating; an IP address the special set of rules that end points in a telecommunications connection use when they communicate. Protocols exist at several levels in a telecommunication connection
Protocol
154
A set of network protocol layers that work together
Protocol Stacks (OSI)
155
A server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service.
Proxy Server
156
The publicly-disclosed component of a pair of cryptographic keys used for asymmetric cryptography
Public Key
157
A synonym for "asymmetric cryptography"
Public Key Encryption
158
Enables users of a basically unsecured public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key paid that is obtained and shared through a trusted authority
Public Key Infrastructure (PKI)
159
For a key agreement protocol based on asymmetric cryptography, the property that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the private keys is compromised in the future
Public-Key Forward Secrecy (PFS)
160
Is the process of receiving images, data, or audio from an unprotected source by listening to radiation signals
Radiation Monitoring
161
A type of malware that is a form of extortion. It works by encrypting a victim's hard drive denying them access to key files
Ransomware
162
Is the phrase of an attack where an attacker finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities
Reconnaissance
163
For Cisco routers are a step towards making the router act like a stateful firewall. The router will make filtering decisions based on whether connections are a part of established traffic or not
Reflective ACLs (Cisco)
164
A series of notes about the internet, started in 1969 (when the Internet was the ARPANET) An Internet Document can be submitted to the IETF by anyone, but the IETF decides if the document becomes an RFC. Eventually, if it gains enough interest, it may evolve into an Internet standard
Request for Comment (RFC)
165
In Windows Operating systems in the central set of settings and information required to run the Windows Computer
Registry
166
Is information sent that is responding to some slimulus
Response
167
Is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Address Resolution Protocol
Reverse Address Resolution Protocol (RARP)
168
Attacks involve tying up finite resources on a system, making them unavailable to others
Resource Exhaustion
169
Acquiring sensitive data by disassembling and analyzing the design of a system component
Reverse Engineering
170
Find out the hostname that corresponds to a particular IP address. Uses an IP address to find a domain name
Reverse Lookup
171
Take public HTTP requests and pass them to back-end webservers to send the content to it, so the proxy can then send the content to the end-user
Reverse Proxy
172
Is the product of the level of threat with the level of vulnerability. It establishes the likelihood of a successful attack
Risk Assessment
173
Avoiding risk even if this leads to the loss of opportunity. For example, using a (more expensive) phone call vs. sending an e-mail in order to avoid risks associated with e-mail may be considered
Risk Averse
174
An algorithm for asymmetric cryptography, invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman
Rivest-Shamir-Adleman (RSA)
175
Assigns users to role based on their organizational functions and determines authorization based on those roles
Role Based Access Control
176
Is the name of the administrator account in Linux systems
Root
177
A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network
Rootkit
178
Is a distance vector protocol used for interior gateway routing which uses hop count as the sole metric of a path's cost
Routing Information Protocol (RIP)
179
Is where two or more poorly configured routers repeatedly exchange the same packet over and over
Routing Loop
180
Determine which RPC services are running on a machine
RPC Scans
181
Targets actions based on rules for entities operating on objects
Rule Set Based Access Control (RSBAC)
182
A security mechanism that uses a cryptographic hash function to generate a sequence of 64-bit, one-time passwords for remote user login. The client generates a one-time password by applying the MD4 cryptographic has function multiple times to the user's secret key
S/Key
183
Is the need to ensure that the people involved with the company, including employees, customers, and visitors, are protected from harm
Safety
184
Searching through data residue in a system to gain unauthorized knowledge of sensitive data
Scavenging
185
Is a protocol developed for credit card transactions in which all parties (customers, merchants, and bank) are authenticated using digital signatures, encryption protects the message and provides integrity, and provides end-to-end security for credit card transactions online
Secure Electronic Transactions (SET)
186
A program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another
Secure Shell (SSH)
187
A protocol developed by Netscape for transmitting private documents via the Internet. Works by using a public key to encrypt data that's transferred over the connection
Secure Sockets Layer (SSL)
188
A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
Security Policy
189
Is another name for TCP packets
Segment
190
Is the principle of splitting privileges among multiple individuals or systems
Separation of Duties
191
As defined by the federal government, is an unclassified information that, if compromised could adversely affect the national interest or conduct of federal initiatives
Sensitive Information
192
A system entity that provides a service in response to requests from other system entities called clients
Server
193
Is a virtual connection between two hosts by which network traffic is passed
Session
194
Take over a session that someone else has established
Session Hijacking
195
In the context of symmetric encryption, a key that is temporary or is used for a relatively short period of time.
Session Key
196
A one way cryptographic has function. Also see "MD5"
SHA1
197
A system file in which encryption user password are stored so that they aren't available to people who try to break into the system
Shadow Password Files
198
Is a resource made public on a machine, such as a directory (file share) or printer (printer share)
Share
199
A Unix term for the interactive user with an operating system.
Shell
200
Gaining indirect knowledge of communicated data by monitoring and analyzing a signal that is emitted by a system and that contains the data but is not intended to communicate the data
Signals Analysis
201
Is a distinct pattern in network traffic that can be identified to a specific tool or exploit
Signature
202
A user cannot write data to higher integrity level than their own
Simple Integrity Property
203
The protocol governing network management and the monitoring of network devices and their functions. A set of protocols for managing complex networks
Simple Network Management Protocol (SNMP)
204
A user cannot read data of a higher classification than their own
Simple Security Property
205
Is an electronic badge that includes a magnetic strip or chip that can record and replay a set key
Smartcard
206
Is a combination of the terms "SMS" and "phishing"
Smishing
207
Works by spoofing the target address and sending a ping to the broadcast address for a remote network, which results in a large amount of ping replies being sent to the target
Smurf
208
Is a tool that monitors network traffic as it received in a network interface
A synonym for "passive wiretapping"
209
A euphemism for non-technical or low-technology means - such as lies, impersonation, tricks, bribes, blackmail, and threats - used to attack information systems
Social Engineering
210
Tells a host's IP stack where to plug in a data stream so that it connects to the right application
Socket
211
A way to uniquely specify a connection, i.e. source IP address, source port, destination IP address, destination port
Socket Pair
212
A protocol that a proxy server can use to accept requests from client users in a companies network so that it can forward them across the internet
SOCKS
213
Computer programs (which are stored in and executed by computer hardware) and associated data (which also is stored in the hardware) that may be dynamically written or modified during execution
Source Port
214
Electronic junk mail or junk newsgroup postings
Spam
215
Configures the switch to behave like a hub for a specific port
Spanning Port
216
Is a algorithm for avoiding problems caused by routes in updates sent to the gateway from which they were learned
Split Horizon
217
A cryptographic key that is divided into two or more separate data items that individually convey no knowledge of the whole key that results from combining the items
Split Key
218
Attempt by an unauthorized entity to gain access to a system by posing as an authorized user
Spoof
219
Is a type of input validation attack specific to database-driven applications where SQL code is inserted into application queries to manipulate the database
SQL Injection
220
Is the technique of using a buffer overflow to trick a computer into executing arbitrary code
Stack Mashing
221
Routers make packet filtering decisions based on Source IP address only
Standard ACLs (Cisco)
222
A user cannot write data to a lower classification level without logging in at that lower classification level
Star Property
223
A system that moves through a series of progressive conditions
State Machine
224
Also referred to as dynamic packet filtering. Is a firewall architecture that works at the network layer
Stateful Inspection
225
Are text files that contain hostname and address mapping
Static Host Tables
226
Means that routing table entries contain information that does not change
Static Routing
227
Is a term that refers to approaches used by malicious code to conceal its presence on the infected system
Stealthing
228
Is the process of detecting and defeating the use of steganography
Steganalysis
229
Methods of hiding the existence of a message or other data
Steganography
230
Is network traffic that initiates a connection or solicits a response
Stimulus
231
Is a method of switching where the entire packet is read by a switch to determine if it is intact before forwarding it
Store-and-Forward
232
Is where the pins on one side of the connector are wired to the same pins on the other end.
Straight-Through Cable
233
Works by encryption a message a single bit, byte, or computer word at a time
Stream Cipher
234
A user cannot write data to higher or lower classification levels than their own
Strong Star Property
235
A separately identifiable part of a larger network that typically represents a certain limited number of host computers, the hosts in a building or geographic area, or the hosts on an individual local are network
Sub Network
236
Used to determine the number of bits used for the subnet and host portions of the address
Subnet Mask
237
Is a networking device that keeps track of MAC addresses attached to each of its ports so that data is only transmitted on the ports that are intended recipient of the data
Switch
238
A communications network, such as the public switched telephone network, in which any user may be connected to any other user through the use of message, circuit, or packet
Switched Network
239
Special files which point at another file
Symbolic Links
240
A branch of cryptography involving algorithms that use the same key for two different steps of the algorithm (such as encryption and decryption)
Symmetric Cryptography
241
A cryptographic key that is used in a symmetric cryptographic algorithm
Symmetric Key
242
A denial of service attack that sends a host name more TCP SYN packets than protocol implementation can handle
SYN Flood
243
Is the signal made up of a distinctive pattern of bits that network hardware looks for to signal that start of a frame
Synchronization
244
Is the system logging facility for Unix systems
Syslog
245
A person responsible for enforcement or administration of the security policy that applies to the system
System Security Officer (SSO)
246
Is a policy written for a specific system or device
System-Specific Policy
247
A digital circuit using TDM (Time-Division Multiplexing)
T1, T3
248
To deliberately alter a system's logic, data or control information to cause the system to perform unauthorized functions or services
Tamper
249
Is the user of odd packet header combinations to determine a remote operating system
TCP Fingerprinting
250
Check each port by performing a full three-way handshake on each port to determine if it was open
TCP Full Open Scan
251
Work by performing the first half of a three-way handshake to determine if a port is open
TCP Half Open Scan
252
A software package which can be used to restrict access to a certain network services based on the source of the connection; a simple tool to monitor and control incoming network traffic
TCP Wrapper
253
Which the Transmission Control Protocol and the Internet Protocol are important parts
TCP/IP (Internet Protocol Suite)
254
Is a freeware protocol analyzer for Unix that can monitor network traffic on a wire
TCPDump
255
A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm
Threat
255
A TCP-based, application-layer, Internet Standard protocol for remote login from one host to another
TELNET
256
Is the identification of types of threats that an organization might be exposed to
Threat Assessment
257
Is used to describe a given threat and the harm it could to do a system if it has a vulnerability
Threat Model
258
A value in an Internet Protocol packet that tells a network router whether or not that packet has been in the network too long and should be discarded
Time to Live
258
The method a threat uses to get to the target
Threat Vector
259
Network is a local area network in which all computers are connected in a ring or star topology and a binary digit or token-passing scheme is used in order to prevent collision of data between two computers that want to send messages at the same time
Token Ring
260
Associates a list of objects and their privileges with each user (The opposite of list based)
Token-Based Access Control
261
Is triggered by the time of day, so every minute the password changes, requiring the user to have the token with them when they log in
Token-Based Devices
262
The geometric arrangement of a computer system. Common topologies include a bus, star, and ring. The specific physical, i.e., real, or logical, i.e., virtual, arrangement of the elements of a network
Topology
263
Is a tool the maps the route a packet takes from the local machine to a remote destination
Traceroute (tracert.exe)
264
A set of rules (protocol) used along with the Internet Protocol to send data in the form of message units between computers over the Internet
Transmission Control Protocol (TCP)
265
A block cipher, based on DES, that transforms each 64-bit plaintext block by applying the Data Encryption Algorithm three successive times, using either two or three different keys, for an effective key length of 112 or 168 bits
Triple DES
265
A protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communication, it ensures that no third party may eavesdrop or tamper with any message
Transport Layer Security (TLS)
266
S/MIME usage; data that has been signed with a digital signature, and then encrypted, and then signed again
Triple-Wrapped
267
A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program
Trojan Horse
268
Is connecting switched together so that they can share VLAN information between them
Trunking
269
Determine which permissions and what actions other systems or users can perform on remote machines
Trust
270
Are ports below number 1024 usually allowed to be opened by the root user
Trusted Ports
271
A communication channel created in a computer network by encapsulating a communication protocol's data packets in a second protocol that normally would be carried above, or at the same layer as the first one
Tunnel
272
Perform scans to determine which UDP ports are open
UDP Scan
273
Broadcasting from host to host
Unicast
274
The generic term for all types of names and addresses that refer to object on the World Wide Web
Uniform Resource Identifier (URI)
275
The global address of documents and other resources on the World Wide Web. The first part of the address indicates what protocol to user, the second part specifies the IP address or the domain name where the resource is located
Uniform Resource Locator (URL)
276
A popular multi-user, multitasking operating system developed at Bell Labs in the early 1970s. Created by just a handful of programmers, Unix was designed to be a small, flexible system used exclusively by programmers
Unix
277
In Windows terminology, a "share" is a mechanism that allows a user to connect to file systems and printers on other systems. An "unprotected share" is one that allows anyone to connect to it
Unprotected Share
278
A person, organization entity, or automated process that accesses a system, whether authorized to do so or not
User
279
Is the alternative method of continuing business operations of IT systems are unavailable
User Contingency Plan
280
A communication protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery services, offering instead a direct way to send and receive datagrams over an IP network
User Datagram Protocol
281
A restricted-use, logical computer network that is constructed from the system resources of a relatively public, physical network often by using encryption at hosts and often by tunneling links of the virtual network across the real network
Virtual Private Network (VPN)
282
A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting inserting a copy of itself into and becoming part of - another program
Virus
283
Refers to phishing attacks that involve the use of voice calls, using either conventional phone systems or Voice over Internet Protocol (VoIP) systems
Vishing (voice or VoIP phishing)
284
A physical discontinuity in a voice network that monitors, alerts and controls inbound and outbound voice network activity based on user-defined call admission control
Voice Firewall
285
A security management system for voice networks which monitors voice traffic for multiple calling patterns or attack/abuse signatures to proactively detect and prevent toll fraud, denial of service, telecom attacks, etc.
Voice Intrusion Prevention System (IPS)
286
Is the process of traveling around looking for wireless access point signals that can be used to get network access
War Driving
287
A software process that runs on a host connected to the Internet to respond to HTTP requests for documents from client web browsers
Web Server
288
A security protocol for wireless local area networks defined in the standard IEEE 802.11b
Wired Equivalent Privacy (WEP)
289
A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio tranceivers
Wireless Application Protocol
290
A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively
Worm
291
Is the day a new vulnerability is made known.
Zero Day
292
A threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed
Zero-Day Attack
293
Is a computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse
Zombies
294