Shared Flashcard Set

Details

Chapter 8
Planning Server and Network Security
27
Computer Networking
Undergraduate 3
07/24/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
Access Control Entries (ACEs)
Definition
An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group, or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.
Term
Access Control List (ACL)
Definition
A collection of access control entries that defines the access that all users and groups have to an object.
Term
biometrics
Definition
Group of technologies that enable computers to identify individuals based on physiological characteristics, such as fingerprints.
Term
BitLocker Drive Encryption
Definition
Windows Server 2008 feature that can encrypt entire volumes to prevent intruders from accessing their data.
Term
centralized authentication
Definition
Security model in which all of the servers on a network rely on a single authority to authenticate users.
Term
decentralized authentication
Definition
Security model in which each server maintains its own list of users and their credentials.
Term
dictionary attacks
Definition
Password penetration technique in which a list of common passwords is encrypted and the results compared with captured ciphertext.
Term
firewall
Definition
Software routine that acts as a virtual barrier between a computer and the attached network. A firewall is essentially a filter that enables certain types of incoming and outgoing traffic to pass through the barrier, while blocking other types.
Term
effective permissions
Definition
Combination of allowed, denied, inherited, and explicitly assigned permissions that provides a composite view of a security principal’s functional access to a resource.
Term
kerberos
Definition
Ticket-based authentication protocol used by Windows computers that are members of an Active Directory domain. Unlike NTLM, which involves only the IIS7 server and the client, Kerberos authentication involves an Active Directory domain controller as well.
Term
Key Distribution Center (KDC)
Definition
Windows Server 2008 component, part of the Kerberos authentication protocol, that maintains a database of account information for all security principals in the domain.
Term
port numbers
Definition
In TCP/IP communications, the code numbers embedded in transport
layer protocol headers that identify the applications that generated and will receive a particular message. The most common firewall rules use port numbers to specify the types of application traffic the computer is allowed to send and receive.
Term
program exception
Definition
In Windows Firewall, a method for opening a communications port through the firewall. When you create a program exception, the specified port is open only while the program is running. When you terminate the program, the firewall closes the port.
Term
public key encryption
Definition
Security relationship in which participants are issued two keys: public and private. The participant keeps the private key secret, while the public key is freely available in the digital certificate. Data encrypted with the private key can be decrypted only using the public key, and data encrypted with the public key can be decrypted only using the private key.
Term
secret key encryption
Definition
Cryptographic system in which one character is substituted for another.
Term
Security Accounts Manager (SAM)
Definition
Component of all Windows computers that enables them to maintain a list of local users and groups that function as a decentralized authentication system. When you log on to a Windows computer for the first time, you use the local Administrator account, which the computer authenticates using its own SAM.
Term
Security Identifiers (SIDs)
Definition
Term
security principal
Definition
User, group, or computer to which an administrator assigns permissions.
Term
single sign-on (SSO)
Definition
Environment in which users can access all network resources with a single set of credentials.
Term
smart card
Definition
Credit card–sized device that contains memory and embedded circuitry that enables it to store data, such as a public encryption key.
Term
social engineering
Definition
Term
special permissions
Definition
Element providing a security principal with a specific degree of access to a resource.
Term
standard permissions
Definition
Common combination of special permissions used to provide a security principal with a level of access to a resource.
Term
Ticket Granting Tickets (TGTs)
Definition
In Kerberos authentication, a credential issued by the Authentication Service that supplies valid authentication credentials. Whenever the client requires access to a new network resource, it must present its TGT to the Key Distribution Center.
Term
Trusted Platform Module (TPM)
Definition
Dedicated cryptographic processor chip that a Windows Server 2008 computer uses to store BitLocker encryption keys.
Term
trusts
Definition
In Active Directory, relationships between domains that enable network resources in one domain to authorize users in another.
Term
tunneling
Definition
Networking technique in which one protocol is encapsulated within another protocol. In virtual private networking (VPN), an entire client/server session is tunneled within another protocol. Because the internal, or payload, protocol is carried by another protocol, it is protected from most standard forms of attack.
Supporting users have an ad free experience!