Term
|
Definition
Programs that run independently between computers and across networks. They Make use of all internet networking. Emails, file transfers. Hard to contain. |
|
|
Term
|
Definition
Encryption. Combination of Public and Private Keys. Public-known to everyone, Private-only by the receiving party. This is Called Asymmetrical. Use private key to decrypt both pieces.
Symmetrical encryption. More Secure. Both are the only people with Encryption Key. You and receiver are the only one with decryption key. Problem is how you get the key securely. |
|
|
Term
|
Definition
They assign the digital certificates. Verisign. They are the ones who validate the authenticity of a website. |
|
|
Term
|
Definition
This is a broadcast message. Another use is for the Access Control Lists (ACL). Used for any keyword. Blanket statement. Like delete *.* All encompassing. |
|
|
Term
|
Definition
Virtual Private Network. Site to Site VPN. 1 location to another. Sits on edge of the LAN and establishes the connection between sites. VPN establishes a connection with another VPN on the other end.
|
|
|
Term
|
Definition
Infrastructure as a service. Hardware services in the cloud and provide virtually. Such as servers, switches, etc. |
|
|
Term
|
Definition
Software as a Service. Cloud using applications, online user interface, any piece of software over the internent |
|
|
Term
|
Definition
Payment Card Industry Data Security Standard. A security standard for credit card data and transactions. Requires network segmentation. |
|
|
Term
|
Definition
Security Information and Event management. A System of collecting and analyzing information generated by firewalls, Intrusion detection systems, and IPS Intrusion protection systems. Analyzes data. |
|
|
Term
|
Definition
Temporal Control Integrity Protocol. Encryption protocol designed as an integrity check for WEP. Wirless Encrption Protcol rather than sophisticated security protocols.
|
|
|
Term
|
Definition
Layer 3. Where firewalls and IPSEC operate as well as IP, Internet. The packet movement work at this level. Not Frames. Emails. |
|
|
Term
|
Definition
Password Authentication Protocol. Authenticated information sent in Clear Text. No encryption. Authentication information is sent in CLEAR TEXT. Not encrypted. Worthless.
|
|
|
Term
|
Definition
An attack in which hackers transmit bogus requests or connection to servers or applications in order to harvest usable information in order to guide the attack efforts. On the front door of servers. |
|
|
Term
|
Definition
Security Encryption Protocol. Secure IP. Requires a regular reestablishment of a connection and can be used with any TCP/IP Transmission |
|
|
Term
|
Definition
Reverse of Proxy. Outside world coming into company network Internal via proxy. Outside-Proxy_firewall. Outside world and come through box to one resource. Don’t want everyone coming through the firewall. The server on the inside can’t trust everyone from the outside. Everyone is shielded on the inside. You can cache as well. Goes out and dumps website on server. Each web page has a TTL. Firewall trusts the Proxy and lets in it to the one resource. |
|
|
Term
|
Definition
Security principal providing proof of delivery and Proof of senders Identification. Verifies we got it and were it came from. |
|
|
Term
|
Definition
Type of virus that’s dormant till specific condition is met. Change of a file or match in current time. Example: i.e. if word printed is yes. |
|
|
Term
|
Definition
Somebody redirecting or capturing secure Transmissions as they occur. Somebody intercepting packets |
|
|
Term
|
Definition
Means Point to Point. One. Such as VOIP. This is how the phone works. It is unicast. Like sending a message to another computer. |
|
|
Term
|
Definition
Hosts or Networks first questions. 2u-2>=hosts unmasked bits, 2^n>=networks, masked bits. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
The last address in a range. In binary all ones in the client section of that address are broadcast. Everyone gets a message. |
|
|
Term
|
Definition
It must be in the address range of the network you’re on. Router |
|
|
Term
|
Definition
Classless interdomain routing. Designation address/ number ones in subnet mask. |
|
|
Term
|
Definition
Use private key to decrypt both pieces. |
|
|
Term
What Encryption is the most secure? |
|
Definition
|
|
Term
What combination of Keypairs are there |
|
Definition
|
|
Term
|
Definition
Combination of Public and Private Keys. Public-known to everyone, Private-only by the receiving party. |
|
|
Term
Problem with Symmetrical encryption |
|
Definition
Problem is how you get the key securely |
|
|
Term
|
Definition
|
|
Term
|
Definition
known only by the receiving party |
|
|
Term
|
Definition
|
|
Term
|
Definition
Intrusion protection systems |
|
|
Term
|
Definition
Intrusion detection systems |
|
|
Term
|
Definition
Temporal Control Integrity Protocol |
|
|
Term
What Layer is NETWORK LAYER
|
|
Definition
|
|
Term
|
Definition
Password Authentication Protocol |
|
|
Term
What Protocol Authentication information is sent in CLEAR TEXT |
|
Definition
|
|
Term
|
Definition
IP Security Encryption Protocol |
|
|
Term
Verifies we got it and were it came from. |
|
Definition
|
|
Term
What is 255.255.255.255 doing |
|
Definition
|
|
Term
|
Definition
Classless interdomain routing |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
The last address in a range is called |
|
Definition
|
|
Term
The packet movement work at this level |
|
Definition
|
|
Term
What Encryption protocol designed as an integrity check for WEP |
|
Definition
|
|
Term
In IP SUBNETTING we are looking for |
|
Definition
IP RANGES
NET ID
USABLE SPACE RANGE
Broadcast ID
SubnetMask
Default Gateway |
|
|