Term
|
Definition
Is a rule to allow traffic only when the connection between the communicating computers is secured using IPsec. |
|
|
Term
|
Definition
The attempt of hacking a password by entering every possible combination of numbers, letters, and symbols of any length until the password is found. |
|
|
Term
|
Definition
Is used to refer to a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong. |
|
|
Term
|
Definition
Is a software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others. |
|
|
Term
|
Definition
Malicious software that enters a computer system without the owner's knowledge or consent. |
|
|
Term
Multifactor authenticated |
|
Definition
Is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction. |
|
|
Term
Personal Identity Verification (PIV) |
|
Definition
Standard for smart card support |
|
|
Term
|
Definition
Is used to decrypt a message and transform it to a readable form. |
|
|
Term
|
Definition
A key that can be obtained and used by anyone to encrypt messages intended for a particular recipient. |
|
|
Term
|
Definition
Specify which packets are allowed to pass through the firewall and which are blocked. |
|
|
Term
|
Definition
Is a type of software that gathers information about computer users and transmits it back to the attacker. |
|
|
Term
|
Definition
Are policies that define specific operating system functions. |
|
|
Term
Windows Biometric Framework |
|
Definition
Provides a core biometric functionality and a Biometric Device control panel for biometric authentication. |
|
|