Shared Flashcard Set

Details

Security+ 3ed - Chapter 7
Mark Ciampa's Security+ text 3rd edition - Chapter 7 Key Terms
49
Computer Networking
Undergraduate 1
10/04/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
access
Definition
Rights given to access services or applcations in access control.
Term
access control
Definition
The process by which resources are granted or denied.
Term
access control list (ACL)
Definition
A set of permissions that is attached to an object.
Term
access control model
Definition
A model that provides a predefined framework for hardware and software developers who need to implement access control functionality in their devices or applications.
Term
access mask
Definition
A 32 bit value in a Windows access control entry that specifies the rights that are allowed or denied and is also used to request access rights.
Term
account expiration
Definition
The process of setting a user's account to expire on a set date or based on inactivity.
Term
active RFID tags
Definition
Radio frequency identification tags that have their own power source and have longer ranges and larger memories than passive RFID tags.
Term
authentication
Definition
crthsng that a user's credentials are genuine and not fabricated.
Term
authorization
Definition
Granting permission to log on to a system based on identification and authentication (presenting valid credentials).
Term
automated provisioning
Definition
Another name for Rule Based Access Control (RBAC).
Term
brute force attack
Definition
An attack on a password that repeatedly tries to re-create it through a random combination of characters.
Term
cipher lock
Definition
combonation locks that use buttons that must be pushed in the proper sequence to open the door.
Term
closed circuIt television (CCTV)
Definition
A technology for using video cameras to transmit a signal to a specific and limited set of receivers for security.
Term
deadbolt lock
Definition
A locl that extends a solid metal bar into the door frame for extra security.
Term
dictionary attack
Definition
An attack on a password that creates hashes of common dictionary words, and then compares those hashed dictionary words against those in the password file.
Term
Discretionary Access Control (DAC)
Definition
An access control model in which the subject has total control over any objects that the subject owns along with the programs that are associated with those objects.
Term
Group Policy Objects (GPOs)
Definition
The location where Group Policy settings are stored.
Term
ID badge
Definition
An identification badge that can be visually screened by security guards or verified by a magnetic strip or barcode identifier.
Term
Identification
Definition
the presentation of credentials or identifying data when logging on to a system.
Term
implicit deny
Definition
An access control principle thit maintnsns that if a condition is not explicitly met then it is to be rejected.
Term
job rotation
Definition
The process of periodically moving individuals from one job responsibility to another.
Term
key-in-knob lock
Definition
Another name for a preset lock.
Term
KVM (keyboard, video mouse) switch
Definition
A device that can be used to connect multiple computers to a single monitor, mouse, and keyboard.
Term
least privilege
Definition
An access control principle that maintains that each user should be given the minimal amount of privileges necessary for that person to perform his or her job function.
Term
IM (LAN Manager) hash
Definition
A legacy format for storing Windows passwords that is considered very weak.
Term
Local Group Policy (LGP)
Definition
A group policy that is used to configure settings for systems that are not part of an Active Directory.
Term
Mandatory Access Control (MAC)
Definition
An access control model in which the end user cannot implement, modify, or transfer any controls.
Term
mantrap
Definition
A security device that monitors and controls two interlocking doors to a small room that separates a nonsecured area from a secured area.
Term
Non-Discretionary Access Control
Definition
Another name for Role Based Access Control.
Term
NTLM (New Technology LAN Manager) hash
Definition
A more secure format for storing Windows passwords that is considered very strong.
Term
object
Definition
A specific resource, such as a file or a hardware device.
Term
operation
Definition
An action that is taken by the subject over an object.
Term
passive RFID tags
Definition
Radio frequency identification tags do not have their own power supply.
Term
physical access log
Definition
A record or list of individuals who entered a secure area, the time that they entered, and the time they left the area.
Term
preset lock
Definition
A lock that requires only a key for unlocking the door front the outside..
Term
rack-mounted servers
Definition
Servers that are stored in a rack and can be stacked with up to 50 other servers in a closely confined area.
Term
radio frequency identification (RFID) tag
Definition
A tag that can be easily affixed to the inside of an ID badge and can be read by an RFID transceiver.
Term
rainbow tables
Definition
An attack on a password that uses a large pregenerated data set of hashes from nearly every possible password.
Term
Registry
Definition
A Microsoft Windows database that stores settings and options for the operating system.
Term
Role Based Access Control rnBAC)
Definition
An access control model that is based on a user's job function within the organization.
Term
Rule Based Access Control (RBAC)
Definition
An access control model that can dynamically assign roles to subjects based on a set of rules defined by a custodian.
Term
Rule-Based Role-Based Access control (RB-RBAC)
Definition
Another name for Rule Based Access Control (RBAC).
Term
salt
Definition
A random sequence of bits input along with the user-created password to protect it from attack.
Term
security identifier (SID)
Definition
An entry in Windows access control that is a unique number issued to the user for security.
Term
separation of duties
Definition
A security provision that requires a process to be divided between two or more individuals.
Term
subject
Definition
A user or a process functioning on behalf of the user who attempts to access an object.
Term
tailgate sensor
Definition
A door security device that contains multiple infrared beams aimed across a doorway.
Term
time of day restrictions
Definition
Limitations placed on when a user can log on to a system.
Term
User Account Control (UAC)
Definition
A Microsoft Windows Vista feature that provides enhanced security by prompting the user for permission whenever software is installed.
Supporting users have an ad free experience!