Terms Deck 4 Flashcards
stream cipher
A cipher in which plaintext bits are encrypted a single bit at a time and combined with a stream of pseudo-random characters.
block cipher
An algorithm that transforms a message from plaintext (unencrypted form) to ciphertext (encrypted form), one piece at a time. The block size represents a standard chunk of data that is transformed in a single operation.
steganography
A word of Greek origin meaning “hidden writing” that refers to hiding messages so that unintended recipients are not even aware that a message exists.
Domain Name System Security Extensions (DNSSEC)
A suite of specifications that provides protection against DNS attacks by authenticating DNS response data.
Secure Shell (SSH)
A protocol designed to support secure remote login, along with secure access to other services across an insecure network. SSH includes a secure transport layer protocol that provides server authentication, confidentiality (encryption), and integrity (message digest functions), along with a user authentication protocol and a connection protocol that runs on top of the user authentication protocol.
Secure/Multipurpose Internet Mail Extensions (S/MIME)
An Internet protocol specified in RFC 2633 and used to secure email communications through encryption and digital signatures for authentication. It generally works with PKI to validate digital signatures and related digital certificates.
Hypertext Transfer Protocol over SSL (HTTPS)
A protocol used in a secured connection that encapsulates data transferred between the client and web server. It occurs on port 443.
Internet Protocol Security (IPsec)
A tool used for the encryption of TCP/IP traffic. IPsec provides security extensions to IPv4. It manages special relationships, called security associations, between pairs of machines.
Authentication Header (AH)
A component of the IPsec protocol that provides integrity, authentication, and antireplay capabilities.
Encapsulated Security Payload (ESP)
A method that provides confidentiality, data origin authentication, connectionless integrity, an antireplay service, and traffic flow confidentiality.
antivirus
A software program used to protect the user environment that scans for email and downloadable malicious code.
host-based intrusion prevention system (HIPS)
A software intrusion detection system capable of reacting to and preventing or terminating unauthorized access within a single host system.
host-based intrusion detection system (HIDS)
Systems that monitor communications on a host-by-host basis and try to filter malicious data. These types of IDSs are good at detecting unauthorized file modifications and user activity.
fuzzing
An unknown environment for software testing in which semirandom data is injected into a program or protocol stack to detect bugs.
self-encrypting drive (SED)
A hard disk that continually performs full disk encryption.
Trusted Platform Module (TPM)
A standard for secure crypto-processor chips that are used to authenticate hardware devices such as PCs or laptops.
sandboxing
A method that allows programs and processes to be run in an isolated environment, to limit access to files and the host system.
demilitarized zone (DMZ)
An area in a network that allows limited and controlled access from the public Internet. Also called a screened subnet.
virtual private network (VPN)
A popular technology that supports reasonably secure logical private network links across some insecure public network infrastructure, such as the Internet. VPNs are more secure than traditional remote access because they can be encrypted and because VPNs support tunneling (hiding numerous types of protocols and sessions within a single host-to-host connection).
network-based intrusion detection system (NIDS)
An IDS that monitors packet flow and tries to locate unauthorized packets that might have gotten through the firewall. A NIDS may be used to detect DoS attacks and unauthorized user access.
network-based intrusion prevention system (NIPS)
A device or software program designed to sit inline with traffic flows and prevent attacks in real time.
web application firewall (WAF)
Software or a hardware appliance used to protect an organization’s web server from attack.
next-generation firewalls (NGFW)
A firewall that goes beyond traditional port and IP address examination to include application and user awareness.
access control list (ACL)
In the broadest sense, the underlying data associated with a network resource that defines the access permissions. The most common privileges include the ability to read, write to, delete, and execute a file.