Term
|
Definition
| Good protection for 128 bit keys |
|
|
Term
|
Definition
|
|
Term
| Cross-site scripting (XSS) |
|
Definition
| This attack vector allows for cookie harvesting |
|
|
Term
| Certificate Authority (CA) |
|
Definition
| Used as a trusted third party for PKI encryption. |
|
|
Term
|
Definition
| Can find vulnerabilities in the host's TCP implementation. No other type of tool can find actual vulnerabilities. In addition, it can find any patches for vulnerabilities found on the system. |
|
|
Term
| Trusted third party model |
|
Definition
|
|
Term
| Cross-certification trust model |
|
Definition
| All participants must send and get keys from all other participants |
|
|
Term
| Federated identity management |
|
Definition
| A series of companies can grant access to users in each other |
|
|
Term
|
Definition
| Single sign on (SSO) example |
|
|
Term
|
Definition
| An attacker exploits a flaw in an application to bypass the security of the application. |
|
|
Term
|
Definition
| Many models of this brand of switches have port security. Many others do not. |
|
|