Term
|
Definition
Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them. |
|
|
Term
|
Definition
Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term Integrity is used frequently when considering Information Security as it is represents one of the primary indicators of security (or lack of it). The integrity of data is not only whether the data is 'correct', but whether it can be trusted and relied upon. For example, making copies (say by e-mailing a file) of a sensitive document, threatens both confidentiality and the integrity of the information. Why? Because, by making one or more copies, the data is then at risk of change or modification. |
|
|
Term
|
Definition
Assurance that information is shared only among authorized persons or organizations. Breaches of Confidentiality can occur when data is not handled in a manner adequate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc. The classification of the information should determine is confidentiality and hence the appropriate safeguards. |
|
|
Term
|
Definition
NAT assigns nonrouting local addresses to the computer systems
in the local area network and uses the single ISP-assigned address to communicate with the Internet.
Since the internal computers are not visible to the public network, they are very much less likely to be scanned or compromised. |
|
|
Term
|
Definition
a system that is used for the express purpose of allowing people to break into it, so that the system owner may observe the attacker's activity. |
|
|
Term
|
Definition
is a network (simulated or real) of honeypots. |
|
|
Term
|
Definition
An IDS (Intrusion Detection System) is a device or application used to inspect all network traffic and alert the user or administrator when there has been unauthorized attempts or access. |
|
|
Term
|
Definition
The main functions of intrusion prevention systems are to identify malicious activity, log information about said activity, attempt to block/stop activity, and report activity. |
|
|
Term
The Differance Between IDS & IPS |
|
Definition
An IDS does just what its name tells us - it detects network intrusion. Simple enough! However, the IDS is basically a "town crier" in that it will notify other network devices about the attack, but does not directly defend against the attack itself.The IDS does not receive traffic flows directly. Instead, the traffic flows are mirrored to the IDS.By the time the IDS detects an issue and notifies the appropriate network devices, the beginning of the infected traffic flow is already in the network.
In contrast, our Intrusion Prevention System (IPS) does sit in the middle of the traffic flow - in this case, the IPS will actually be our Cisco router. When the IPS detects a problem, the IPS itself can prevent the traffic from entering the network. |
|
|
Term
TACACS+
Terminal Access Controller Access Control System, |
|
Definition
anauthentication protocol that was commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication serverin order to determine if the user has access to the network. |
|
|
Term
(RADIUS)
Remote Authentication Dial In User Service |
|
Definition
is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. |
|
|
Term
|
Definition
A cryptosystem that uses symmetric key encryption
to validate an individual user to various network
resources. |
|
|
Term
|
Definition
A network or system subnet that is configured to
misdirect hackers by resembling networks or system subsystems
that are rich with information.
|
|
|
Term
|
Definition
Decoy systems designed to lure potential attackers
away from critical systems. |
|
|
Term
|
Definition
is a device that connects PCs together. In general, what is called a hub in today’s market is a "dumb" device. In a hub, when one PC sends data onto the wire, the hub simply forwards the packets to all the other devices connected to it. Each device is responsible for determining which packets are destined for it and ignoring the others. Current "hubs" typically share bandwidth between all the ports. In the days of coaxial networking, hubs were often called "bridges". Because they forward every packet that they receive, they do nothing to streamline the traffic on your local network. |
|
|
Term
|
Definition
. A switch is a little smarter than a hub, in that it records the IP and MAC addresses in a table of all the devices connected to it. Thus, when a packet is put onto the wire by one device, the switch reads the destination address information to determine if the destination device is connected to it. If it is, the switch forwards the packet ONLY to the destination device, sparing the other devices connected to it from having to read and deal with the traffic (making your network more efficient). If the switch does not recognize the destination device, then the switch sends the packet to everything connected to it, thereby requiring the devices to decide for themselves whether or not the packet is for them. In general, switches provide each device connected to them with dedicated bandwidth. |
|
|
Term
|
Definition
is the "smartest" device of them all. A router records the address information of everything connected to it like a switch. But it also records the address of the next closest router in the network. |
|
|
Term
|
Definition
Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. |
|
|
Term
|
Definition
The Abbreviation SFTP nowadays invariably means Secure File Transfer Protocol, however there is another protocol with the same abbreviation (Simple File Transfer Protocol). All occurrences of the term SFTP on this website (www.radinks.com) refers to Secure File Transfer Protocol. |
|
|
Term
Internet Protocol Version 6 address (IPv6 address) |
|
Definition
is a numerical label that is used to identify a network interface of a computer or other network node participating in an IPv6-enabledcomputer network. |
|
|
Term
|
Definition
A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. |
|
|
Term
|
Definition
- Remind students that worms are malicious programs that replicate themselves constantly without requiring another program to provide a safe environment for replication. Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth.
|
|
|
Term
|
Definition
Each infected machine infects certain common executable or script files on all computers to which it can write with virus code that can cause infection. |
|
|
Term
|
Definition
Synonymous with proxy firewall. A server that is configured to look like a Web server and performs actions. on behalf of that server to protect it from hacking. |
|
|
Term
|
Definition
Remote Access(if your at home and you want to use remote access what happens.)Remote private network and stuff like that. |
|
|
Term
|
Definition
Space between a Secure Network and a Unsecured Network,Demiliterized Zone |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
used to set up VLANs ( if you want to set up VLANS) |
|
|
Term
|
Definition
used to separate different types of traffic on a network,if you have a merged network ,you'll use a VLAN to set up for your voice traffic.You can also ,if your trying to set up and you want to seperate VLAN traffic on an AP access point for a customer (the Lobby)so might want to put that on its own VLAN. |
|
|
Term
|
Definition
It hides your private IP Address and makes it Public.( you've got a whole bunch of privates inside your company and when it comes out into the public network it will be a different IP address ,it will be a NATed address. |
|
|
Term
|
Definition
Authenticate's User's on Dial-UP , use,s UDP, |
|
|
Term
|
Definition
Authenticates user's also and uses TCP protocol.for transport;and is a CYSCO propitiatory authentication server. |
|
|
Term
What Port Is This (HTTPS) |
|
Definition
|
|
Term
|
Definition
|
|
Term
What Port Is This (TELnet) |
|
Definition
|
|
Term
|
Definition
Can Block Ports,close off ports,it can monitor, |
|
|
Term
|
Definition
A server that does things in your name, (It Cashes),,,,It can keep memory of where you went out on a site;so you don't have to go the distribution,and cuts down on the overall traffic on networks. |
|
|
Term
|
Definition
Detects attacks while there occurring or have already occurred. |
|
|
Term
|
Definition
This is Pro active it trys to prevent, Takes measure after the attack. |
|
|
Term
|
Definition
A highly targeted phishing attack that usually appears to be from an employer, colleague, or other legitimate correspondent |
|
|