Term
|
Definition
Programs that run independently between computers and across networks. They Make use of all internet networking. Emails, file transfers. Hard to contain. |
|
|
Term
|
Definition
Encryption. Combination of Public and Private Keys. Public-known to everyone, Private-only by the receiving party. This is Called Asymmetrical. Use private key to decrypt both pieces.
Symmetrical encryption. More Secure. Both are the only people with Encryption Key. You and receiver are the only one with decryption key. Problem is how you get the key securely. |
|
|
Term
|
Definition
They assign the digital certificates. Verisign. They are the ones who validate the authenticity of a website. |
|
|
Term
|
Definition
This is a broadcast message. Another use is for the Access Control Lists (ACL). Used for any keyword. Blanket statement. Like delete *.* All encompassing. |
|
|
Term
|
Definition
Virtual Private Network. Site to Site VPN. 1 location to another. Sits on edge of the LAN and establishes the connection between sites. VPN establishes a connection with another VPN on the other end.
|
|
|
Term
|
Definition
Infrastructure as a service. Hardware services in the cloud and provide virtually. Such as servers, switches, etc. |
|
|
Term
|
Definition
| Software as a Service. Cloud using applications, online user interface, any piece of software over the internent |
|
|
Term
|
Definition
Payment Card Industry Data Security Standard. A security standard for credit card data and transactions. Requires network segmentation. |
|
|
Term
|
Definition
| Security Information and Event management. A System of collecting and analyzing information generated by firewalls, Intrusion detection systems, and IPS Intrusion protection systems. Analyzes data. |
|
|
Term
|
Definition
Temporal Control Integrity Protocol. Encryption protocol designed as an integrity check for WEP. Wirless Encrption Protcol rather than sophisticated security protocols.
|
|
|
Term
|
Definition
Layer 3. Where firewalls and IPSEC operate as well as IP, Internet. The packet movement work at this level. Not Frames. Emails. |
|
|
Term
|
Definition
Password Authentication Protocol. Authenticated information sent in Clear Text. No encryption. Authentication information is sent in CLEAR TEXT. Not encrypted. Worthless.
|
|
|
Term
|
Definition
An attack in which hackers transmit bogus requests or connection to servers or applications in order to harvest usable information in order to guide the attack efforts. On the front door of servers. |
|
|
Term
|
Definition
| Security Encryption Protocol. Secure IP. Requires a regular reestablishment of a connection and can be used with any TCP/IP Transmission |
|
|
Term
|
Definition
Reverse of Proxy. Outside world coming into company network Internal via proxy. Outside-Proxy_firewall. Outside world and come through box to one resource. Don’t want everyone coming through the firewall. The server on the inside can’t trust everyone from the outside. Everyone is shielded on the inside. You can cache as well. Goes out and dumps website on server. Each web page has a TTL. Firewall trusts the Proxy and lets in it to the one resource. |
|
|
Term
|
Definition
Security principal providing proof of delivery and Proof of senders Identification. Verifies we got it and were it came from. |
|
|
Term
|
Definition
Type of virus that’s dormant till specific condition is met. Change of a file or match in current time. Example: i.e. if word printed is yes. |
|
|
Term
|
Definition
| Somebody redirecting or capturing secure Transmissions as they occur. Somebody intercepting packets |
|
|
Term
|
Definition
| Means Point to Point. One. Such as VOIP. This is how the phone works. It is unicast. Like sending a message to another computer. |
|
|
Term
|
Definition
Hosts or Networks first questions. 2u-2>=hosts unmasked bits, 2^n>=networks, masked bits. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
The last address in a range. In binary all ones in the client section of that address are broadcast. Everyone gets a message. |
|
|
Term
|
Definition
| It must be in the address range of the network you’re on. Router |
|
|
Term
|
Definition
Classless interdomain routing. Designation address/ number ones in subnet mask. |
|
|
Term
|
Definition
| Use private key to decrypt both pieces. |
|
|
Term
| What Encryption is the most secure? |
|
Definition
|
|
Term
What combination of Keypairs are there |
|
Definition
|
|
Term
|
Definition
| Combination of Public and Private Keys. Public-known to everyone, Private-only by the receiving party. |
|
|
Term
| Problem with Symmetrical encryption |
|
Definition
| Problem is how you get the key securely |
|
|
Term
|
Definition
|
|
Term
|
Definition
| known only by the receiving party |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Intrusion protection systems |
|
|
Term
|
Definition
| Intrusion detection systems |
|
|
Term
|
Definition
| Temporal Control Integrity Protocol |
|
|
Term
What Layer is NETWORK LAYER
|
|
Definition
|
|
Term
|
Definition
| Password Authentication Protocol |
|
|
Term
| What Protocol Authentication information is sent in CLEAR TEXT |
|
Definition
|
|
Term
|
Definition
| IP Security Encryption Protocol |
|
|
Term
| Verifies we got it and were it came from. |
|
Definition
|
|
Term
What is 255.255.255.255 doing |
|
Definition
|
|
Term
|
Definition
| Classless interdomain routing |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| The last address in a range is called |
|
Definition
|
|
Term
| The packet movement work at this level |
|
Definition
|
|
Term
| What Encryption protocol designed as an integrity check for WEP |
|
Definition
|
|
Term
| In IP SUBNETTING we are looking for |
|
Definition
IP RANGES
NET ID
USABLE SPACE RANGE
Broadcast ID
SubnetMask
Default Gateway |
|
|