vocabularyG2H Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Gate

A

A physical access control which is a controlled entry and exit point in a fence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Gateway

A

Found in the network layer of the ISO/OSI reference model, this device acts as a translator between networks with different communication protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GISRA

A

Government Information Security Reform Act is the law set forth by the U.S. government to provide a comprehensive framework for establishing effectiveness of controls. This law calls for increased network security controls and government-wide management of information security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Gramm-Leach-Bliley Act

A

A law that modifies restrictions that govern exchange of financial information between financial institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Grudge Attack

A

A type of attack in which the attacker seeks to get revenge on the target, person, or organization. The general purpose is to harm the reputation of the person by destroying or exploiting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Guideline

A

A recommended action or guide in which the user works within standards, but they are not mandatory. It provides details on how to implement standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacker

A

A person who is well skilled in a programming language and often considered an expert on the subject. Can be a complimentary or derogatory term.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hacker

A

Also referred to as a cracker, a hacker is a person who is well skilled in a programming language and is often considered an expert on the subject. Can be a complimentary or derogatory term.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacking

A

The act of compromising access controls to gain unauthorized access to a system. Once access is gained, the attacker generally launches a data attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hardware

A

The physical parts of a computer system that can be touched, such as the printer, mouse, and modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware Segmentation

A

A security control architecture that physically isolates different pieces of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hash Total

A

An error-checking value taken from a string of text that will be processed. After processing, the original value and the checked value are compared to determine if the original value has changed in any way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HDLC

A

High-level Data Link Control is a protocol for information transfer which is an extension of the SDLC that was adopted by the ISO. It supports both point-to-point and multipoint configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HIPAA

A

The Health Insurance Portability and Accountability Act is a law that sets forth strict regulations for organizations that process or store personal medical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HMAC

A

Hashes Message Authentication Code is an algorithm used to authenticate digital signatures which uses shared secret keys so it cannot provide nonrepudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeypot

A

A monitoring process that segments an area or entire machine onto a portion of the network, opening ports to entice a hacker to find and attack the machine.

17
Q

Hot Site

A

A data center alternative facility that has the same up-to-date hardware and software capabilities as the primary data center. This is a very expensive option, but is operational immediately.

18
Q

Hub

A

A connection device for networks that receives signals on one port and sends the signals to other ports.

19
Q

Hybrid Model

A

A combination of centralized and decentralized authentication.