Term
|
Definition
Good protection for 128 bit keys |
|
|
Term
|
Definition
|
|
Term
Cross-site scripting (XSS) |
|
Definition
This attack vector allows for cookie harvesting |
|
|
Term
Certificate Authority (CA) |
|
Definition
Used as a trusted third party for PKI encryption. |
|
|
Term
|
Definition
Can find vulnerabilities in the host's TCP implementation. No other type of tool can find actual vulnerabilities. In addition, it can find any patches for vulnerabilities found on the system. |
|
|
Term
Trusted third party model |
|
Definition
|
|
Term
Cross-certification trust model |
|
Definition
All participants must send and get keys from all other participants |
|
|
Term
Federated identity management |
|
Definition
A series of companies can grant access to users in each other |
|
|
Term
|
Definition
Single sign on (SSO) example |
|
|
Term
|
Definition
An attacker exploits a flaw in an application to bypass the security of the application. |
|
|
Term
|
Definition
Many models of this brand of switches have port security. Many others do not. |
|
|