Vocabulary Flashcards
Definitions
A block cipher type of encryption considered to be less vulnerable than DES.
3DES (Triple Data Encryption Standard)
The act of restricting both physical, file and server access so those who need it have it, but those who don’t need it do not have it.
Access Control
The process of preventing an account from logging on after a number of incorrect log on attempts
Account Lockout
A directory service used in a Windows domain to store and administer users, groups, printers, devices, and other objects.
Active Directory
A type of share that is only accessible by administrators, backup operators, and server operators.
Administrative Shares
A form of malware which displays advertisements while an app is being used.
Adware
A block cipher type of encryption which comes in 128, 192, and 256 bits
AES (Advance Encryption Standard)
Files that are copies of files from network drives.
Antispam
A firewall filtering method which analyzes data at layer 5 (the session layer) of the OSI model.
Application-Level Firewall
An impostor-like misuse of a network protocol for the purpose of attacking a network.
ARP Spoofing
A type of encryption in which one key encrypts data and the other key decrypts data.
Asymmetric Encryption
the totality of ways in which a system can be attacked.
Attack Surface
A mechanism by which a log tracks who has logged on to a system and what has been accessed on the system.
Auditing
The act of verifying identification to a application or a system
Authentication
the part of the CIA triangle that ensured data is accessible by those who need it, when they need it.
Availability
Malware used to do unauthorized tasks on a system through an opening in the system.
Backdoor
A certificate type which support storage of a single certificate.
Base-64-Encoded X.509
The for of authentication that uses devices such as retina scanners, voice recognition, fingerprint scanners, or facial recognition for authentication.
Biometrics
An encryption system which encrypts entire dives.
BitLocker
A type of encryption system which encrypt removable hard drives.
BitLocker To Go
a block of plain text plus a key to encrypt the block of text.
Block Cipher
An Attack in which all possible combinations of characters are used in an attempt to crack a password.
Brute Force Attack
An overloading of a reserved space of data, this causes the system to slow down, freeze, or crash.
Buffer Overflow
A server or third-party entity used to issue digital certificates
CA ( Certificate Authority)
A challenge-response authentication protocol which uses MD5 hashing
CHAP (Challenge Handshake Authentication Protocol)
the combination of confidentiality, integrity, and availability as it relate to securing data systems.
CIA Triangle
A filtering mechanism in which data packets are filtered by port and/or protocol.
Circuit Filtering
The act of keeping data and systems secure from unauthorized access.
Confidentiality
A piece of text which stores information, site preference, and shopping cart contents.
Cookie
Used to store certificates that have been revoked due to expiration or being compromised.
CRL (Certificate Revocation List)
An attack in which data on a network is captured and then resent.
Cross-site Scripting Attack
An attack in which a network is disrupted to the point to where they cannot function.
DDoS (Denial of Service) Attack
Security through layers of a building, such as the external perimeter, the physical doors, and the internal part of a building.
Defense in Depth
the act of passing control of a resource (such as an organizational unit) from one entity to another.
Delegation
Encoded binary X.509 certificates which do not support private key storage.
DES (Data Encryption Standard)
A tool which uses code integrity policies to lock devices to only run trusted apps.
Device Guard
a type of certificate used to store public keys and information such as user, organization, serial number, and expiration date.
Digital Certificate
A certificate which is used to verify authenticity of a document or email message.
Digital Signature
A computer which becomes part of Botnet and helps carry out DDoS
DNS Poisoning
A form of spoofing in which MAC address/IP address combinations are compromised through stealing the IP address of a host and then using that to force traffic to an attacking machine.
DNS Spoofing
A mechanism used to securely transmit data over part of a VPN connection.
DNSSEC
A tool sued to capture network packets on connected ports. this can be used for analysis or for hacking.
DoS Attack
A form of NAT which maps one private IP address to one public IP address.
Dynamic NAT
the cumulative total of inherited and explicit permissions given to a user or group on a resource.
Effective Permissions
A Windows encryption mechanism which encrypts file and folders
EFS (Encrypting File system)
An attack in which a virus or worm takes advantage of a software vulnerability.
Email Bombing
the adding of a cipher text to data to scramble the data to make it unreadable without a decryption key.
Encryption
An attack of an IP address to where a source IP is forged.
ESP
A Windows tool used store and present application, security, and system logs, all for the purpose of information and troubleshooting.
Event Viewer.
Permissions which are granted to a user or group by an administrator.
Explicit Permissions
The entry area to a building and the immediate area outside of the building
External Perimeter
A network security system and/or hardware device which controls any incoming and outgoing network traffic based on a set of rules provided by an administrator.
Firewall
A Windows tool which is used to control rights for users, groups, and organizational units.
Group Policies
A concept by which multiple services are installed across multiple servers.
Hash Function