Shared Flashcard Set

Details

Network Infrastructure
Chapter 9 Securing Data Transmission and Authentication
24
Computer Networking
Undergraduate 1
08/08/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
Authentication exemption
Definition
Connection security rule used to specify one or more computers that do not need to be authenticated in order to pass traffic.
Term
Authentication Header (AH)
Definition
IPSec protocol that provides authentication, integrity, and anti-replay for the entire packet.
Term
authentication method
Definition
Security algorithm and type used for IPSec authentication and key exchange.
Term
checksum
Definition
Mathematical value that is used to provide an integrity check for a network packet.
Term
Connection Security Rules
Definition
Windows Firewall component that requires two peer computers to mutually authenticate before they can pass information between them.
Term
cookie
Definition
Text files sent by a server to a Web browser, used for authenticating, tracking, and maintaining specific information about users.
Term
default response rule
Definition
Connection security rule used to ensure that the computer responds to requests for secure communication.
Term
dynamic rekeying
Definition
Determination of new keying material through a new Diffie-Hellman exchange that takes place on a regular basis.
Term
Encapsulating Security Payload (ESP)
Definition
IPSec protocol that provides confidentiality (in addition to authentication, integrity, and anti-replay) for the IP payload.
Term
exceptions
Definition
Windows Firewall configuration item that allows specifically defined traffic to traverse the firewall.
Term
identity spoofing
Definition
Attack in which an attacker can falsify or “spoof” the identity of either the sending or receiving computer.
Term
IPSec
Definition
Suite of protocols used to provide security for TCP/IP hosts at the Internet layer.
Term
Isolation
Definition
Connection security rule used to restrict inbound and outbound connections.
Term
LM Authentication
Definition
Weakest form of NTLM authentication that has been in use since the earliest days of Windows networking.
Term
mirrored
Definition
Process by which network traffic that is defined in one direction will also be defined in the opposite direction.
Term
NTLM Authentication
Definition
User authentication based on the NT LAN Manager authentication protocol.
Term
NTLMv2 Authentication
Definition
Strongest form of NTLM authentication.
Term
packet sniffer
Definition
Computer software or hardware that can intercept and monitor network traffic in real time.
Term
quick mode negotiation
Definition
Portion of IPSec negotiation in which Security Associations are negotiated and where computers negotiate the primary protocols (AH and/or ESP), hash algorithm, and encryption algorithm to use for data transfer.
Term
scopes
Definition
In DHCP, the portion of the TCP/IP address space that is allocated for a particular group of computers, typically on a single subnet.
Term
Server-to-server
Definition
Connection security rule that secures traffic between two servers or two groups of servers.
Term
transport mode
Definition
IPSec mode used to provide end-to-end security.
Term
Tunnel
Definition
Connection security rule that secures traffic only between two tunnel endpoints and not between the actual hosts that send and receive secured traffic.
Term
Tunnel mode
Definition
IPSec mode used to provide site-to-site communications that cross the Internet (or other public networks).
Supporting users have an ad free experience!