Shared Flashcard Set

Details

Network Security (Part 2) - CTN277
NetSec terminology (Ch 4-6)
89
Computer Networking
Undergraduate 1
02/03/2015

Additional Computer Networking Flashcards

 


 

Cards

Term
Security Control
Definition
Any device or process that is used to reduce risk.
Term
Administrative Controls
Definition
Level of security controls. The processes for developing and ensuring policies and procedures are carried out. Decide what users may do, must do, or cannot do.
Term
Technical Controls
Definition
Level of security controls. Controls that are carried out or managed by devices.
Term
Activity Phase Controls
Definition
General use term for subtypes of security controls.
Term
Deterrent Control
Definition
Activity phase control. Control subtype that attempts to discourage security violations before they occur.
Term
Preventative Control
Definition
Activity phase control. Control subtype that works to prevent a threat from contacting a vulnerability.
Term
Detective Control
Definition
Activity phase control. Control subtype designed to identify threats that have reached the system.
Term
Compensating Control
Definition
Activity phase control. Control subtype that provides an alternative to normal controls that cannot be used.
Term
Corrective Control
Definition
Activity phase control. Control subtype that is intended to mitigate damage caused by a security incident that has already occurred.
Term
External Perimeter Defenses
Definition
Physical security defenses designed to restrict access to the areas where equipment is located. Consists of defensive measures used to prevent entering or climbing over barriers around a restricted area, or to detect unauthorized persons within a restricted area.
Term
Barricade
Definition
Physical security defense designed to block or direct the passage of traffic. Generally this method can be circumvented by climbing over it.
Term
CCTV (Closed Circuit Television)
Definition
Physical security defense that consists of a network of video surveillance equipment that uses video cameras to transmit a signal to a specific set of receivers.
Term
Motion Detection
Definition
Physical security defense used to determine an object's change in position in relation to its surroundings.
Term
Cipher Lock
Definition
Intelligent combination lock that uses buttons that must be pressed in the proper sequence in order to open the door. The combination can be programmed to change at specified times or as necessary.
Term
Physical Token
Definition
A physical object used to identify a user in order to gain access to a restricted area. An ID badge is the most common type.
Term
Proximity Reader
Definition
Device that detects a signal emitted from a physical token within a certain range.
Term
RFID (Radio Frequency Identification)
Definition
Tag affixed to a physical token that can be read by a scanner or proximity reader via radio waves.
Term
Access List
Definition
Record of individuals who have permission to enter a secure area.
Term
Mantrap
Definition
Device designed to separate a nonsecured area from a secured area. It consists of device monitors and controls two interlocking doors to a vestibule (small room) that only allows one door to be opened at a time.
Term
PDS (Protected Distribution System)
Definition
A system of cable conduits (hollow tubes that carry network cables) used to protect classified information that is transmitted between two secure areas.
Term
Hardware Security
Definition
Physical security that involves protecting the hardware of the host system.
Term
Cable Lock
Definition
Lock inserted into the security slot of a portable device used to secure the device to furniture with a steel cable.
Term
Locking Cabinet/Safe
Definition
Locked box used to secure a portable device such as a laptop. May contain other functions such as a charging station.
Term
Security Policy
Definition
Document that clearly defines the defense mechanisms an organization will employ in order to keep information secure.
Term
Baseline
Definition
Standard against which systems can be evaluated and audited for their security posture. This is often done via a specialized software for this purpose.
Term
Security Posture
Definition
The level of security that a system has.
Term
Security Template
Definition
A collection of security configuration settings.
Term
- Protect the physical device
- Secure the OS
- Use antimalware software
Definition
Three steps to secure the host?
Term
- Develop security policy
- Perform baselining
- Configure OS security settings
- Deploy & manage security settings
- Patch management
Definition
Five steps to enhance the security of an OS?
Term
Patch
Definition
Universal, publicly released software security update that is intended to repair a known vulnerability.
Term
Hotfix
Definition
Software update that addresses a security issue specific to certain customers.
Term
Service Pack
Definition
Cumulative software update package consisting of patches, hotfixes, and other features.
Term
OS Hardening
Definition
The implementation of security measures into the design and coding of an OS.
Term
Trusted OS
Definition
An OS that has been designed with the implementation of OS hardening.
Term
Static Analysis
Definition
Antivirus software scanning method used to match known virus patterns against potentially infected files.
Term
Dynamic Heuristic Detection
Definition
Antivirus software scanning method that uses a variety of techniques to detect general characteristics of viruses, rather than attempting to make a match against known specific viruses.
Term
Bayesian Filtering
Definition
Antispam filtering technique that detects spam by analyzing all words in email messages, and marks emails as spam that have a high amount of words that are most likely to be seen in a spam email.
Term
Packet Filter
Definition
Also known as a firewall, or software that is designed to prevent malicious network packets from entering a system by blocking network ports or applications.
Term
Embedded System
Definition
Computer systems with a minimal OS and specific, dedicated function such as printers or ATMs.
Term
Mainframe
Definition
Large computer system with significant processing capabilities.
Term
SCADA (Supervisory Control And Data Acquisition)
Definition
Large scale industrial control systems used in environments such as military, manufacturing, and power plants.
Term
Fuzz Testing/Fuzzing
Definition
Software testing technique used to deliberately provide invalid, unexpected, or random data in order to detect errors.
Term
XSRF (Cross-Site Request Forgery)
Definition
Attack that uses a user's web browser settings to impersonate the user.
Term
DLP (Data Loss Prevention)
Definition
A system of security tools used to recognize and identify critical data. It monitors who is using the data and how it is being accessed in order to protect the data from unauthorized users.
Term
Data In-Use
Definition
Data actions being performed by endpoint devices (ex. creating/accessing an offline document)
Term
Data In-Transit
Definition
Data actions that are transmitted across a network (ex. sending an email)
Term
Data At-Rest
Definition
Data that is stored on electronic media.
Term
Cryptography
Definition
Transforming information into a secure form so that unauthorized persons cannot access it.
Term
Steganography
Definition
Hiding the existence of data within a different data type.
Term
Metadata
Definition
Data that is used to describe the content or structure of a file.
Term
Encryption
Definition
The process of converting plaintext into ciphertext.
Term
Decryption
Definition
The process of converting ciphertext into plaintext.
Term
Cleartext
Definition
Unencrypted data.
Term
Plaintext
Definition
Cleartext data that is to be encrypted, or that has resulted from being decrypted.
Term
Ciphertext
Definition
Encrypted data.
Term
Algorithm
Definition
Procedures based on a mathematical formula that encrypt and decrypt data.
Term
- Confidentiality (ensuring only authorized parties view it)
- Integrity (ensuring the data is correct and has not been altered)
- Availability (ensuring that authorized users are able to access the data)
- Authentication (verifying the identity of a user)
- Non-repudiation (verifying whether an authorized user, rather than an imposter, performed a specific action)
Definition
The five basic protections of cryptography?
Term
Non-repudiation
Definition
The process of verifying whether a user performed an action.
Term
Stream Cipher or Substitution Cipher
Definition
A cipher that replaces one character with one or more different characters.
Term
Block Cipher
Definition
A cipher that manipulates an entire block of plaintext at once.
Term
Sponge Function
Definition
A cipher that changes a string of any length into a different string of any length.
Term
Hash/Hashing
Definition
A one-way algorithm that creates a unique digital fingerprint for a set of data/The process of creating that fingerprint.
Term
Digest or Message Digest
Definition
A unique digital fingerprint of a set of data that was created from the process of hashing.
Term
One-way Algorithm
Definition
An algorithm that cannot be reversed.
Term
Hashed Message Authentication Code
Definition
A hash function that uses a shared secret key, sent along with a message, that is unique to the sender.
Term
MD5 (Message Digest 5)
Definition
The most recent message digest version. It produces a message padded to 512 bits that is expressed as a 32-bit hexadecimal number.
Term
SHA (Secure Hash Algorithm)
Definition
A very secure hash with four versions. It consists of a 160-bit digest and a 40 digit hexadecimal number, and uses a sponge function.
Term
Whirlpool
Definition
A newer, unpatented cipher consisting of a 512-bit digest.
Term
RIPEMD (Research and Development in Advanced Communications Technologies Integrity Primitives Evaluation Message Digest)
Definition
Message digest consisting of two parallel chains of computation that combine their result at the end. It has different versions that vary in length.
Term
Symmetric Cryptographic Algorithms or Private Key Cryptography
Definition
Algorithms that use the same key to encrypt and decrypt data.
Term
DES (Data Encryption Standard)
Definition
An older symmetric cryptography algorithm that uses a block cipher with a 56-bit key size. This original standard is no longer considered secure and newer, slightly more secure versions exist.
Term
AES (Advanced Encryption Standard)
Definition
A symmetric cryptography algorithm that uses a block cipher with a key size of either 128, 192, or 256 bits depending on the version. It is considered very secure as there have been no successful attacks against it.
Term
Twofish/Blowfish
Definition
A block cipher algorithm that runs effectively on 32-bit computers/A more secure version of this algorithm, which can have a key length from 32 to 448 bits
Term
OTP (One-Time Pad)
Definition
The only known cryptography method that cannot be broken mathematically. It consists of a sequence of random letters (a pad) that is used as a random key and combined with plaintext. It does not require the use of a computer and is intended to be destroyed after use.
Term
Asymmetric Cryptographic Algorithms or Public Key Cryptography
Definition
Cryptography method that uses two mathematically related keys: a public key, and a private key.
Term
Digital Signature
Definition
An electronic verification of the sender.
Term
RSA (Rivest-Shamir-Adleman)
Definition
The most common asymmetric cryptography algorithm, which is based around prime numbers.
Term
ECC (Ecliptic Curve Cryptography)
Definition
An asymmetric cryptography algorithm method which is based around sloping curves.
Term
NTRUEncrypt
Definition
A lattice-based asymmetric cryptographic algorithm.
Term
Quantum Cryptography
Definition
A cryptography method that exploits the properties of microscopic objects.
Term
Key Exchange
Definition
The process of sending and receiving public or private keys.
Term
Out-of-Band
Definition
A key exchange method that takes place outside of normal communication channels.
Term
In-Band
Definition
A key exchange method that takes place within normal communication channels. These methods include: DH, DHE, ECDH, and Perfect Forward Secrecy.
Term
Perfect Forward Secrecy
Definition
An in-band key exchange method which generates random public keys which are different for each session and thus cannot reveal the contents of more than one message.
Term
PGP (Pretty Good Privacy)
Definition
A common cryptography system for files on Windows systems.
Term
GPG (GNU Privacy Guard)
Definition
A common open-source cryptography system for files on Windows, Linux, and UNIX systems.
Term
Whole Disk Encryption
Definition
Cryptography method that applies to an entire hard disk, such as Bitlocker.
Term
TPM (Trusted Platform Module)
Definition
Cryptographic services provided via a dedicated chip on the motherboard.
Term
HSM (Hardware Security Module)
Definition
A physical hardware device that provides cryptographic services and is often a LAN based appliance intended to provide these services to multiple devices.
Supporting users have an ad free experience!