Terminology Flashcards
Access Control
The process of granting or denying specific requests for or attempts to connect to a corporate network.
The process of granting or denying specific requests for or attempts to connect to a corporate network.
Access Control
Access Control List (ACL)
Applies rules to switch ports or (Internet Protocol) IP addresses available to a host or switch. The rules determine whether packets can flow through those ports or IPs.
Set of rules that apply to switch ports or (Internet Protocol) IP addresses available to a host or switch. The rules determine whether packets can flow through those ports or IPs.
Access Control List (ACL)
Access Layer
The concentration point at which clients access the network. Access layer devices control traffic by localizing service requests to the access medial.
The concentration point at which clients access the network. These devices control traffic by localizing service requests to the access medial.
Access Layer
Accounting
The final piece in the AAA framework is accounting, which monitors the resources a user consumes during network access.
The final piece in the AAA framework, which monitors the resources a user consumes during network access.
Accounting
Agent
A piece of software that functions as an agent for a user or another program, working autonomously and continuously in a particular environment.
A piece of software that functions as an agent for a user or another program, working autonomously and continuously in a particular environment.
Agent
Antivirus
A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
Antivirus
Attack Surface
The set of ways in which an adversary can enter a system and potentially cause damage.
The set of ways in which an adversary can enter a system and potentially cause damage.
Attack Surface
Authentication
The process of verifying the identity or other attributes of an entity (user, process, or device).
The process of verifying the identity or other attributes of an entity (user, process, or device).
Authentication
Authoization
A process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
A process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
Authorization
Compliance
A program that establishes risk-based controls to protect the integrity, confidentiality, and accessibility of information stored, processed, or transferred.
A program that establishes risk-based controls to protect the integrity, confidentiality, and accessibility of information stored, processed, or transferred.
Compliance
Data Breach
The unauthorized moment or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
The unauthorized moment or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
Data Breach
Data Loss Prevention
Procedures and mechanism to stop sensitive data from leaving a security boundary.
Procedures and mechanism to stop sensitive data from leaving a security boundary.
Data Loss Prevention
Digital Certificate
A file or electronic password that proves the authenticity of a device, server, or user with cryptography and the public key infrastructure (PKI)
A file or electronic password that proves the authenticity of a device, server, or user with cryptography and the public key infrastructure (PKI)
Digital Certificate
Distributed Denial of Service (DDos)
A denial of service technique that uses numerous systems to perform the attack simultaneously.
A denial of service technique that uses numerous systems to perform the attack simultaneously.
Distributed Denial of Service (DDos)
Extensible Authentication Protocol (EAP)
An architectural framework that provides extensibility for the authentication methods for commonly used protected network access technologies, such as IEEE 802.1X-based wireless access, IEEE 802.1X-based wired access, and point-to-point protocol (PPP) connections such as Virtual Private Networking (VPN).
An architectural framework that provides extensibility for the authentication methods for commonly used protected network access technologies, such as IEEE 802.1X-based wireless access, IEEE 802.1X-based wired access, and point-to-point protocol (PPP) connections such as Virtual Private Networking (VPN).
Extensible Authentication Protocol (EAP)
Firewall
A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
Firewall
HTTPS
Secure Hypertext Transfer Protocol is the secure version of HTTP. Data sent between the browser and server are encrypted to ensure protection. Which Network Protocol Types are Right for You?
The secure version of HTTP. Data sent between the browser and server are encrypted to ensure protection. Which Network Protocol Types are Right for You?
HTTPS
Information Security Policy
An aggregate of directives, regulations, roles and practices that prescribe how an organization manages, protects, and distributes information.
An aggregate of directives, regulations, roles and practices that prescribe how an organization manages, protects, and distributes information.
Information Security Policy
Intrusion Detection
The process and methods for analyzing information from networks and information systems to determine if a security break or security violation has occurred.
Internet of Things
A network of connected smart devices providing rich operational data to enterprises. It is a catch-all term for the growing number of electronics that aren’t traditional computing devices, but are connected to the internet to gather data, receive instructions, or both.
A network of connected smart devices providing rich operational data to enterprises. It is a catch-all term for the growing number of electronics that aren’t traditional computing devices, but are connected to the internet to gather data, receive instructions, or both.
Internet of Things
Internet Protocol Security (IPSec)
A secure network protocol suite that authenticates and encrypts data packets to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).
A secure network protocol suite that authenticates and encrypts data packets to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).
Internet Protocol Security (IPSec)
Lightweight Directory Access Protocol (LDAP)
An open, Vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network.
An open, Vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network.
Lightweight Directory Access Protocol (LDAP)
Link Layer
The lowest layer in the internet protocol suite, the networking architecture of the Internet. The link layer is the group of methods and communications protocols confined to the link that a host if physically connected to.
The lowest layer in the internet protocol suite, the networking architecture of the Internet. The link layer is the group of methods and communications protocols confined to the link that a host if physically connected to.
Link Layer
Local Area Network (LAN)
A network that covers a small area such as a small office or home. It physically connects all the computers located in the premises.
A network that covers a small area such as a small office or home. It physically connects all the computers located in the premises.
Local Area Network (LAN)
Media Access Control (MAC) Address
The unique 48-bit serial number in the network circuitry of every Ethernet and Wi-Fi device. The MAC address, which holds 256 trillion unique numbers, identifies that device from every other globally.