Term
Access Control Entries (ACEs) |
|
Definition
An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group, or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL. |
|
|
Term
Access Control List (ACL) |
|
Definition
A collection of access control entries that defines the access that all users and groups have to an object. |
|
|
Term
|
Definition
Group of technologies that enable computers to identify individuals based on physiological characteristics, such as fingerprints. |
|
|
Term
BitLocker Drive Encryption |
|
Definition
Windows Server 2008 feature that can encrypt entire volumes to prevent intruders from accessing their data. |
|
|
Term
centralized authentication |
|
Definition
Security model in which all of the servers on a network rely on a single authority to authenticate users. |
|
|
Term
decentralized authentication |
|
Definition
Security model in which each server maintains its own list of users and their credentials. |
|
|
Term
|
Definition
Password penetration technique in which a list of common passwords is encrypted and the results compared with captured ciphertext. |
|
|
Term
|
Definition
Software routine that acts as a virtual barrier between a computer and the attached network. A firewall is essentially a filter that enables certain types of incoming and outgoing traffic to pass through the barrier, while blocking other types. |
|
|
Term
|
Definition
Combination of allowed, denied, inherited, and explicitly assigned permissions that provides a composite view of a security principal’s functional access to a resource. |
|
|
Term
|
Definition
Ticket-based authentication protocol used by Windows computers that are members of an Active Directory domain. Unlike NTLM, which involves only the IIS7 server and the client, Kerberos authentication involves an Active Directory domain controller as well. |
|
|
Term
Key Distribution Center (KDC) |
|
Definition
Windows Server 2008 component, part of the Kerberos authentication protocol, that maintains a database of account information for all security principals in the domain. |
|
|
Term
|
Definition
In TCP/IP communications, the code numbers embedded in transport layer protocol headers that identify the applications that generated and will receive a particular message. The most common firewall rules use port numbers to specify the types of application traffic the computer is allowed to send and receive. |
|
|
Term
|
Definition
In Windows Firewall, a method for opening a communications port through the firewall. When you create a program exception, the specified port is open only while the program is running. When you terminate the program, the firewall closes the port. |
|
|
Term
|
Definition
Security relationship in which participants are issued two keys: public and private. The participant keeps the private key secret, while the public key is freely available in the digital certificate. Data encrypted with the private key can be decrypted only using the public key, and data encrypted with the public key can be decrypted only using the private key. |
|
|
Term
|
Definition
Cryptographic system in which one character is substituted for another. |
|
|
Term
Security Accounts Manager (SAM) |
|
Definition
Component of all Windows computers that enables them to maintain a list of local users and groups that function as a decentralized authentication system. When you log on to a Windows computer for the first time, you use the local Administrator account, which the computer authenticates using its own SAM. |
|
|
Term
Security Identifiers (SIDs) |
|
Definition
|
|
Term
|
Definition
User, group, or computer to which an administrator assigns permissions. |
|
|
Term
|
Definition
Environment in which users can access all network resources with a single set of credentials. |
|
|
Term
|
Definition
Credit card–sized device that contains memory and embedded circuitry that enables it to store data, such as a public encryption key. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Element providing a security principal with a specific degree of access to a resource. |
|
|
Term
|
Definition
Common combination of special permissions used to provide a security principal with a level of access to a resource. |
|
|
Term
Ticket Granting Tickets (TGTs) |
|
Definition
In Kerberos authentication, a credential issued by the Authentication Service that supplies valid authentication credentials. Whenever the client requires access to a new network resource, it must present its TGT to the Key Distribution Center. |
|
|
Term
Trusted Platform Module (TPM) |
|
Definition
Dedicated cryptographic processor chip that a Windows Server 2008 computer uses to store BitLocker encryption keys. |
|
|
Term
|
Definition
In Active Directory, relationships between domains that enable network resources in one domain to authorize users in another. |
|
|
Term
|
Definition
Networking technique in which one protocol is encapsulated within another protocol. In virtual private networking (VPN), an entire client/server session is tunneled within another protocol. Because the internal, or payload, protocol is carried by another protocol, it is protected from most standard forms of attack. |
|
|