Shared Flashcard Set

Details

NET110 CH 12
Network Security
22
Other
Undergraduate 3
11/11/2012

Additional Other Flashcards

 


 

Cards

Term
ROUTER
Definition
A ____'s main function is to examine packets and determine where to direct them based on their Network layer addressing information.
Term
EXTERNAL
Definition
Network security is more often compromised “from the inside” than from ______ sources
Term
BREACHES
Definition
Human errors, ignorance, and omissions cause more than half of all security______ sustained by networks.
Term
AUTHENTICATION
Definition
____ protocols are the rules that computers follow to accomplish authentication.
Term
MUTUAL
Definition
In ____ authentication, both computers verify the credentials of the other.
Term
MAN
Definition
In a ____-in-the-middle attack, a person redirects or captures secure transmissions as they occur
Term
SPOOFING
Definition
In DNS ____ , a hacker forges name server records to falsify his host’s identity.
Term
DOS
Definition
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.
Term
SSL
Definition
____ is a method of encrypting TCP/IP transmissions.
Term
SCANNING
Definition
Port ____ software searches a node for open ports.
Term
FLASHING
Definition
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions
Term
CONCENTRATOR
Definition
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
Term
CERTIFICATE
Definition
A digital ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
Term
KEY
Definition
The combination of a public key and a private key is known as a ____ pair.
Term
PHISHING
Definition
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Term
PGP
Definition
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
Term
ACCOUNTING
Definition
RADIUS and TACACS belong to a category of protocols known as AAA (authentication, authorization, and ____).
Term
BRUTE
Definition
A ____ force attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
Term
PACKET
Definition
A ____-filtering firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
Term
PKI
Definition
The use of certificate authorities to associate public keys with certain users is known as ____.
Term
DICTIONARY
Definition
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
Term
SECURITY
Definition
A _______ policy does not state exactly which hardware, software, architecture, or protocols will be used to ensure security.
Supporting users have an ad free experience!