Shared Flashcard Set

Details

Understanding Security
Understanding Network Security Fundamentals
56
Computer Science
Not Applicable
06/27/2010

Additional Computer Science Flashcards

 


 

Cards

Term

 

 

 

Authentication

Definition

 

 

 

 

What proves that a user or system is actually how they say they are?

Term

 

 

 

Username and Password

Definition

 

 

 

Name 2 unique identifiers for a logon process.

Term

 

 

 

 

Password Authentication Protocol (PAP)

Definition

 

 

One of the simplest forms of authentication, the username and password values are both sent to the server as clear text and checked for a match.

Term

 

 

 

Challenge Handshake Authentication Protocol (CHAP)

Definition

 

 

 

 

What protocol challenges a system to verify identity?

Term

 

 

 

 

CHAP

Definition

 

 

Doesn't use a user ID/Password mechanism, instead, the initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and, if the information matches, grants authorization.

Term

 

 

 

Certificates

Definition

 

 

 

 

What can be stored on physical access devices such as  smart cards or stored on the users computer as a digital signature used as part of the logon process.

Term

 

 

 

 

Certificate Practice Statement(CPS)

Definition

 

 

 

 

What outlines the rules for issuing and managing certificates?

Term

 

 

 

 

Certificate Revocation List(CRL)

Definition

 

 

 

 

Lists the revocations that must be addressed (often due to expiration) in order to stay current.

Term

 

 

 

 

Security Tokens

Definition

 

 

 

 

They contain the rights and access privileges of the token bearer as part of the token.

Term

 

 

 

 

Kerberos

Definition

 

 

 

 

An authentication protocol named after the mythical three-headed dog that stood at the gates of Hades.

Term

 

 

 

 

Multifactor

Definition

 

 

 

 

When two or more access methods are included as part of the authentication process, you're implementing a _______  system.

Term

 

 

 

 

Two-factor authentication

Definition

 

 

 

 

A system that uses smart cards and passwords is referred to as a __________  system.

Term

 

 

 

 

Degaussed

Definition

 

 

 

 

When computer systems are retired, the disk drives should be zeroed out, and all magnetic media should be what?

Term

 

 

 

 

Disk Wiping

Definition

 

 

 

 

Degaussing involves applying a strong magnetic field to initialize the media.  This is also refered to as what?

Term

 

 

 

 

Smart Card

Definition

 

 

 

 

A type of card that gives you access to resources including buildings, parking lots, and computers. It contains information about your identity and access privileges.

Term

 

 

 

 

Biometric

Definition

 

 

 

 

________ devices use physical characteristics to identify the user.

Term

 

 

 

 

Key Fobs

Definition

 

 

 

These are security devices that you carry with you that display a randomly generated code that you can then use for authentication.

Term

 

 

 

Software Exploitation

Definition

 

 

 

Refers to attacks launched against applications and higher-level services. They include gaining access to data using weaknesses in the data-access objects of a database or a flaw in a service.

Term

 

 

 

Database Exploitation

 

Application Exploitation

 

E-mail Exploitation

Definition

 

 

 

 

3 Types pf exploitations that can be introduced using viruses.

Term

 

 

 

 

.SCR files (screensavers)

Definition

 

 

 

 

Viruses are often distributed through the use of these files?

Term

 

 

 

Rootkits

Definition

 

 

 

 

________ are software programs that have the ability to hide certain things from the operating system.

Term

 

 

 

 

Virus

Definition

 

 

 

 

A ______ is a piece of software designed to infect a computer system.

Term

 

 

Contaminated floppy, cd, memory card

 

Email

As part of another program

Definition

 

 

 

 

Viruses get into your computer in one of three ways.  What are they?

Term

 

 

 

 

Trojan Horses

Definition

 

 

 

 

________ are programs that enter a system or network under the guise of another program. May be included as an attachment or as part of an installation program.

Term

 

 

 

 

A Worm

Definition

 

 

 

 

What can reproduce itself, is self-contained, and doesn't need a host application to be transported.?

Term

 

 

 

 

Spam

Definition

 

 

 

 

Any unwanted, and unsolicited e-mail

Term

 

 

 

 

Grayware

Definition

 

 

 

A term used to describe any application that is annoying or negatively affecting the performance of your computer

Term

 

 

 

 

Firewall

Definition

 

 

 

 

One of the first lines of defense in a network.

Term

 

 

 

 

Share-level and User-level access privileges

Definition

 

 

 

 

FAT allows only two types of protection, what are they?

Term

 

 

 

 

NTFS

Definition

 

 

 

 

Can track security in Access Control Lists (ACL)

Term

 

 

 

 

Access Control List (ACL)

Definition

 

 

 

 

Each entry in the _______  can also specify what type of access is given.

Term

 

 

 

 

BitLocker

Definition

 

 

 

 

A drive encryption feature that can encrypt an entire volume with 128-bit encryption.

Term

 

 

 

 

BitLocker

Definition

 

 

 

 

One of the newest security features available only in the Enterprise and Ultimate versions of Windows Vista.

Term

 

 

 

 

Service-Set Identifiers (SSIDs)

Definition

 

 

 

 

 

Wireless controllers use ________ that must be configured in the network cards to allow communications with a specific access point.

Term

 

 

 

 

Wireless Transport Layer Security(WTLS)

Definition

 

 

 

 

The security layer for WAP (Wireless Applications Protocol)

Term

 

 

 

 

WAP

Definition

 

 

 

 

Provides the functional equivalent of TCP/IP for wireless devices.

Term

 

 

 

 

Direct-sequence spread spectrum (DSSS)

Definition

 

 

 

 

Accomplishes communication by adding the data that is to be transmitted to a higher-speed transmission.

Term

 

 

 

 

Frequency-hopping spread spectrum (FHSS)

Definition

 

 

 

 

Accomplishes communication by hopping the transmission over a range of predefined frequencies.

Term

 

 

 

 

Orthogonal frequency division multiplexing (OFDM)

Definition

 

 

 

 

Accomplishes communication by breaking the data into subsignals and transmitting them simultaneously.

Term

 

 

 

 

Wireless Markup Language (WML)

Definition

 

 

 

 

WAP uses a smaller version of HTML called _______ , which is used for internet displays.

Term

 

 

 

 

Site Survey

Definition

 

 

 

 

When used by an attacker, a ______ can determine what types of systems are in use, the protocols used, and other critical information about your network.

Term

 

 

 Perimeter Security 

 

 

Definition

 

 

 

The first layer of access control is always what?

Term

 

 

 

Cryptographic Algorithms

Definition

 

 

 

 

______ are used to encode a message from its unencrypted or clear-text state into an encrypted message.

Term

 

 

 

Hashing, Symmetric, and Asymmetric

Definition

 

 

 

The three primary methods of encoding a message are?

Term

 

 

 

Secure Hash Algorithm (SHA)

 

Message Digest Algorithm (MDA)

Definition

 

 

 

 

The 2 primary standards that use the hashing process for encryption are?

Term

 

 

 

Secure Hash Algorithm

Definition

 

 

 

Which algorithm was designed to ensure the integrity of a message and produces a 160-bit hash value?

Term

 

 

 

 

MD5, MD4, and MD2

Definition

 

 

 

 

The message digest algorithm (MDA) also creates a hash value and uses a one-way hash. There are several versions of MD, what are the most common?

Term

 

 

 

 

Symmetric Algorithms

Definition

 

 

 

_______ require both ends of an encrypted message to have the same key and processing algorithms.

Term

 

 

 

 

Asymmetric Algorithm

Definition

 

 

 

 

_____ use 2 keys to encrypt and decrypt data. These keys are referred to as the public key and the private key.

Term

 

 

 

Incident

Definition

 

 

 

Any attempt to violate a security policy, a successful penetration, a compromise of a system, or any unauthorized access to information.

Term

 

 

 

Incident Response Policies

Definition

 

 

 

 

______ define how an organization will respond to an incident.

Term

 

 

 

Social Engineering

Definition

 

 

 

________ is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization.

Term

 

 

 

The supervisor password

Definition

 

 

 

 

______ is only needed when the user attempts to access the setup program.

Term

 

 

 

Trusted Platform Module

Definition

 

 

 

____ is the name assigned to a chip that can store cryptographic keys, passwords, or certificates.

Term

 

 

 

Access Control

Definition

 

 

 

_______ defines the methods used to ensure that users of your network can access only what they're authorized to access.

Term

 

 

 

Data remnant removal

Definition

 

 

 

 

________ is typically the name given to removing all usable data from media.

Supporting users have an ad free experience!