Terms Deck 4 Flashcards
stream cipher
A cipher in which plaintext bits are encrypted a single bit at a time and combined with a stream of pseudo-random characters.
block cipher
An algorithm that transforms a message from plaintext (unencrypted form) to ciphertext (encrypted form), one piece at a time. The block size represents a standard chunk of data that is transformed in a single operation.
steganography
A word of Greek origin meaning “hidden writing” that refers to hiding messages so that unintended recipients are not even aware that a message exists.
Domain Name System Security Extensions (DNSSEC)
A suite of specifications that provides protection against DNS attacks by authenticating DNS response data.
Secure Shell (SSH)
A protocol designed to support secure remote login, along with secure access to other services across an insecure network. SSH includes a secure transport layer protocol that provides server authentication, confidentiality (encryption), and integrity (message digest functions), along with a user authentication protocol and a connection protocol that runs on top of the user authentication protocol.
Secure/Multipurpose Internet Mail Extensions (S/MIME)
An Internet protocol specified in RFC 2633 and used to secure email communications through encryption and digital signatures for authentication. It generally works with PKI to validate digital signatures and related digital certificates.
Hypertext Transfer Protocol over SSL (HTTPS)
A protocol used in a secured connection that encapsulates data transferred between the client and web server. It occurs on port 443.
Internet Protocol Security (IPsec)
A tool used for the encryption of TCP/IP traffic. IPsec provides security extensions to IPv4. It manages special relationships, called security associations, between pairs of machines.
Authentication Header (AH)
A component of the IPsec protocol that provides integrity, authentication, and antireplay capabilities.
Encapsulated Security Payload (ESP)
A method that provides confidentiality, data origin authentication, connectionless integrity, an antireplay service, and traffic flow confidentiality.
antivirus
A software program used to protect the user environment that scans for email and downloadable malicious code.
host-based intrusion prevention system (HIPS)
A software intrusion detection system capable of reacting to and preventing or terminating unauthorized access within a single host system.
host-based intrusion detection system (HIDS)
Systems that monitor communications on a host-by-host basis and try to filter malicious data. These types of IDSs are good at detecting unauthorized file modifications and user activity.
fuzzing
An unknown environment for software testing in which semirandom data is injected into a program or protocol stack to detect bugs.
self-encrypting drive (SED)
A hard disk that continually performs full disk encryption.
Trusted Platform Module (TPM)
A standard for secure crypto-processor chips that are used to authenticate hardware devices such as PCs or laptops.
sandboxing
A method that allows programs and processes to be run in an isolated environment, to limit access to files and the host system.
demilitarized zone (DMZ)
An area in a network that allows limited and controlled access from the public Internet. Also called a screened subnet.