Term
|
Definition
A malicious attack using social skills directed at a person who has access to sensitive data |
|
|
Term
|
Definition
A form of social engineering in which an attacker tricks or manipulates a user to give out sensitive data or into allowing unauthorized programs onto the computer or network |
|
|
Term
|
Definition
Unsolicited contact that you did not ask for and don't want and might come from an attack |
|
|
Term
|
Definition
Any program unknowingly transmitted to a computer or network designed to cause damage. Also called malware |
|
|
Term
|
Definition
A type of malware designed to secretly collect information on a computer or network |
|
|
Term
|
Definition
A program designed to prevent spyware from being installed on a computer |
|
|
Term
Main distribution frame (MDF) |
|
Definition
A cable rack that connects and manages wiring used for telecommunication between a service provider and intermediate distribution frames (IDFs). The MDF connects private or public lines coming into a facility with the networking devices in the facility |
|
|
Term
Intermediate distribution frame (IDF) |
|
Definition
A cable rack that connects and manages writing used form telecommunication between the MDF and devices suck as computers or network printers. IDFs are usually found on each floor of a building in a data closet |
|
|
Term
|
Definition
A device synced with a network authentication service that provides a code used to log in to a network or other system |
|
|
Term
|
Definition
A card with a magnetic strip or chip that identifies the person assigned to the card |
|
|
Term
|
Definition
A device used to identify a person based on biological data |
|
|
Term
Secure socket layer (SSL) |
|
Definition
A handshake between a web server and a browser to establish a secure connection |
|
|
Term
|
Definition
An outdated block cipher that uses a 64-bit cipher block and a 56-bit key |
|
|
Term
Triple data encryption standard (3DES) |
|
Definition
An encryption similar to DES but uses a key that can be three times the size at a 168-bit key |
|
|
Term
pretty good privacy (PGP) |
|
Definition
An encryption method designed for signing and encrypting e-mail, which uses both symmetric and asymmetric encryption |
|
|
Term
Network attached storage (NAS) |
|
Definition
A storage device connected directly to the network |
|
|
Term
Storage area network (SAN) |
|
Definition
An independent network separate from the normal LAN designed for data storage |
|
|
Term
Media access control (MAC) filtering |
|
Definition
The method to secure a network by limiting which devices are allowed to connect to a network base on a list of MAC addresses kept by the wireless access points |
|
|
Term
Remote desktop connection (RDC) |
|
Definition
A remote connection used to view another computer's desktop in a window. RDC was created by Microsoft |
|
|
Term
|
Definition
A connection to a mainframe computer that holds all the data being accessed. A terminal emulator typically loooks like a command prompt window |
|
|
Term
Layer 2 tunneling protocol (L2TP) |
|
Definition
A fully encrypted tunneling protocol used to create a VPN connection |
|
|
Term
|
Definition
An encrypted tunneling protocol used by client/server application to connect a remote client to a sever. The protocol is designed to ensure confidentiality and integrity of data over an unsecured network |
|
|