Term
ACE- access control entry |
|
Definition
is each entry in the ACL table,it includes 4 items; a security identifierfor the user and group accounts, or logon sessions, an access mask that specifies the access rights controlled, a flag that indicates the type, a set of flags that determine whether objects can inherit permissions |
|
|
Term
|
Definition
a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications |
|
|
Term
|
Definition
is an active directory domain services feature, prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force |
|
|
Term
|
Definition
a set of permissions that are attached to an object. Specifies which subjects are allowed to access the object and what operations they can perform on it |
|
|
Term
|
Definition
checking the delivery persons credentials to be sure that they are authentic and not fabricated |
|
|
Term
|
Definition
granting permission to take the action |
|
|
Term
|
Definition
a reference set of data against which operational data is compared |
|
|
Term
|
Definition
authenticates by normal actions that the user performs; keystroke dynamics, voice recognition, and computer foot printing |
|
|
Term
|
Definition
an automated password cracking technique in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in the stole file |
|
|
Term
CHAP- Challenge handshake authentication protocol |
|
Definition
authenticates a user or network host to an authenticating entity such as an Internet service provider, providing protection against replay attacks by the peer through the use of an incrementally changing identifier and of a variable challenge-value |
|
|
Term
|
Definition
related to the perception, thought process, and understanding of the user. considered much easier for the user to remember because it is based on the users life experiences |
|
|
Term
|
Definition
a Department of Defense smart card that is used for identification for active duty and reserve military personnel, along with civilian employees and special contractors |
|
|
Term
DAC-discretionary access control |
|
Definition
one of four access controls. the least restrictive access control model, in which the owner of the object has total control over it |
|
|
Term
|
Definition
a database stored on the network itself that contains information about users and network devices |
|
|
Term
|
Definition
functions as a separate network outside the secure network perimeter; untrusted outside users can access it but cannot enter the secure network |
|
|
Term
|
Definition
a hiearchical or tree name system for matching computer names and numbers |
|
|
Term
|
Definition
a small database maintained by a computers OS. it contains records of all recently accessed internet domains |
|
|
Term
|
Definition
an attack that substitutes certain addresses so that a computer is automatically redirected to another device |
|
|
Term
|
Definition
hardware or software that is designed to prevent malicious packets from entering or leaving computers or a network |
|
|
Term
FTP- file transfer protocol |
|
Definition
an unsecure TCP/IP protocol that is commonly used for data transfer |
|
|
Term
HIDS- host intrusions detection system |
|
Definition
software based application that runs on a local host computer that can detect an attack as it occurs |
|
|
Term
|
Definition
a standard network device for connecting multiple Ethernet devices together to make them function as a single segment |
|
|
Term
|
Definition
a variation of the dictionary attack, it will slightly alter dictionary words by adding numbers to the end af the password, spelling words backwards, slightly misspelling words, or including special characters |
|
|
Term
ICMP-Internet control message protocol |
|
Definition
a TCP/IP protocol that is used by devices to communicate updates or error information to other devices |
|
|
Term
|
Definition
a numerical label assigned to each device participating in a computer network that uses the Internet protocol for communication. Serves 2 principle functions: host or network interface identification and location addressing |
|
|
Term
|
Definition
instead of one person having sole resposibility for a function, individuals are periodically moved from one job responsibility to another |
|
|
Term
|
Definition
an authentication system developed by MITand is used to verify the identity of networked users |
|
|
Term
|
Definition
a device that can direct requests to different servers based on a variety of factors, such as the number of server connections, the servers processor utilization and overall performance |
|
|
Term
|
Definition
a unique identifier assigned to network interfaces for communications on the physical network segment |
|
|
Term
|
Definition
a technique that allows private IP addresses to be used on the public Internet |
|
|
Term
NIDS- network intrusion detection system |
|
Definition
a technology that watches for attacks on the network and reports back to a central device |
|
|
Term
NIPS- network intrusion prevention system |
|
Definition
a technology that monitors network traffic to immediately react to block a malicious attack |
|
|
Term
PAT- port address translation |
|
Definition
each packet is givin the same IP address but a different TCP port number allowing a single public address to be used by several users |
|
|
Term
Personal Identity Verification (PIV) |
|
Definition
a government standard for smart cards that covers all government employees |
|
|
Term
|
Definition
a malformed ping using ICMP is sent to the victims computer that exceeds the size of an IP packet causing the host to crash |
|
|
Term
|
Definition
a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user |
|
|
Term
|
Definition
an industry standard authentication service with wide spread support across nearly all vendors of network equipment |
|
|
Term
|
Definition
large pre-generated data sets of encrypted passwords used in password attacks |
|
|
Term
|
Definition
a device that can forward packets across computer networks |
|
|
Term
|
Definition
the practice of requiring that processes should be divided between two or more individuals |
|
|
Term
|
Definition
an attack that broadcasts a ping request to all computers on a network yet changes the address from which it came, to that of the target, making it appear that the target computer is asking for a response from all computers- they respond overwhelming the target causing it to crash |
|
|
Term
SNMP- simple network management protocol |
|
Definition
a TCP/IP protocol that exchanges management information between networked devices and allows network administrators to remotely monitor, manage and configure devices on the network |
|
|
Term
|
Definition
uses fingerprints or other unique physical characteristics of a persons face, hands, or eyes for authentication |
|
|
Term
Stateful packet filtering |
|
Definition
keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions |
|
|
Term
|
Definition
a technique that uses IP addresses to divide a network into network, subnet, and host |
|
|
Term
|
Definition
a device that connects network segments and forwards only frames intended for that specific device or frames sent to all devices |
|
|
Term
TACAS-
terminal access control access control system |
|
Definition
an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server |
|
|
Term
|
Definition
tha most common protocol suite used today for local area networks and the internet |
|
|
Term
|
Definition
a network protocol used on the internet or local area networksto provide a bidirectional interactive text-oriented communicatio facility using a virtual terminal connection |
|
|
Term
|
Definition
a small device with a window display that shows a code to be used for authentication |
|
|
Term
UDP- user datagram protocol |
|
Definition
computer applications can send messages to other host on a Internet protocol network without prior communications to set up special transmission channels or data paths |
|
|
Term
|
Definition
a technology that allows scattered users to be logically grouped together even thoughthey may be attached to different switches |
|
|
Term
VPNvirtual private network |
|
Definition
a technology to use an unsecured public network like a secure private network |
|
|
Term
|
Definition
|
|
Term
|
Definition
provides the user interface to allow network services
provides services for user applications:
Telnet, FTP, TFTP, SMTP, IMAP, POP, DNS |
|
|
Term
|
Definition
|
|
Term
|
Definition
is concerned with how the data is represented and formatted for the user
used for translation
compressed and encryption
HTTP |
|
|
Term
|
Definition
|
|
Term
|
Definition
has the resposibility of permitting the two parties on the network to hold ongoing communications across the network
allows devices to establish and manage sessions |
|
|
Term
|
Definition
|
|
Term
|
Definition
is responsible for ensuring that error free data is givin to the user
provides connection establishment, management, and termination as well as acknowledgments and retransmissions
TCP, UDP |
|
|
Term
|
Definition
|
|
Term
|
Definition
picks the route the packet is to take and handles the addressing of the for delivery
makes logical addressing, routing, fragmentation and reassembly available
IPv4/IPv6, ICMP, ARP |
|
|
Term
|
Definition
|
|
Term
|
Definition
is resposible for dividing the data into packets
error detection and correction
performs physical addressing, data framing, error detedtion, and handling
ARP, Frame relay, PPP, Token ring |
|
|
Term
|
Definition
|
|
Term
|
Definition
sends the signal to the network or receives the signal from the network
involved with encoding and signaling, data transmission, and reception |
|
|