Term
|
Definition
Recovery Point Objective (RPO) is a measure of how frequently you take backups. RPO refers to the amount of data the business can afford to lose |
|
|
Term
|
Definition
Recovery Time Objective (RTO) is the amount of downtime a business can tolerate. RTO = Downtime. RTO states how much downtime an application experiences before there is a measurable business loss. |
|
|
Term
|
Definition
Mean Time To Repair, is the time it takes to run a repair after the occurrence of the failure. |
|
|
Term
|
Definition
Mean Time Between Failures, is a metric that concerns the average time elapsed between a failure and the next time it occurs. |
|
|
Term
Privacy Threshold Analysis |
|
Definition
PTA => to help a company's departments gauge their system's information, and determine how to appropriately treat data that has been acquired by the organization. Identify if PII is present |
|
|
Term
Privacy Impact Assessment |
|
Definition
The objective of the PIA is to systematically identify the risks and potential effects of collecting, maintaining, and disseminating PII and to examine and evaluate alternative processes for handling information to mitigate potential privacy risks. This comes after PTA |
|
|
Term
|
Definition
Business Continuity Plan include a BIA (Business Impact Analysis) |
|
|
Term
|
Definition
Business Impact Analysis includes information potential monetary losses along with the impact on life, and the organization's reputation. |
|
|
Term
|
Definition
Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks |
|
|
Term
|
Definition
Rapid Spanning Tree Protocol - RSTP provides significantly faster recovery in response to network changes or failures, introducing new convergence behaviors and bridge port roles to do this. with backward compatibility to legacy Spanning Tree (STP) 802.1D |
|
|
Term
|
Definition
a network switch can connect multiple devices and networks to expand the LAN. Ethernet switch creates networks. Network switches operate at layer two (Data Link Layer) of the OSI model. |
|
|
Term
|
Definition
a router will allow you to share a single IP address among multiple network devices. Routers operate at Layer 3 (Network) of the OSI model The router allows for connections between networks |
|
|
Term
|
Definition
* Integrity * Nonrepudiation |
|
|
Term
|
Definition
two or more parties authenticate each other |
|
|
Term
Type 1: authentication factors |
|
Definition
Type 1 – Something You Know – includes passwords, PINs, combinations, code words, or secret handshakes. Anything that you can remember and then type, say, do, perform, or otherwise recall when needed falls into this category. |
|
|
Term
Type 2: authentication factors |
|
Definition
Type 2 – Something You Have – includes all items that are physical objects, such as keys, smart phones, smart cards, USB drives, and token devices. (A token device produces a time-based PIN or can compute a response from a challenge number issued by the server.). |
|
|
Term
Type 3: authentication factors |
|
Definition
Type 3 – Something You Are – includes any part of the human body that can be offered for verification, such as fingerprints, palm scanning, facial recognition, retina scans, iris scans, and voice verification. |
|
|
Term
|
Definition
when an occurrence is flagged as malicious |
|
|
Term
|
Definition
Remote Authentication Dial-In User Service servers are central user or authentication points on the network. Authentication can occur in many ways, such as like EAP (Extensible Auth. Protocol) or CHAP (Challenge Handshake Auth. Protocol) |
|
|
Term
|
Definition
attempts to replay the results of a previously successful session to gain access. |
|
|
Term
Input validation helps against... |
|
Definition
|
|
Term
|
Definition
Trusted Platform Module - the name of a chip that can store cryptographic keys, passwords, or certificates. |
|
|
Term
"bare metal" hypervisor type |
|
Definition
|
|
Term
|
Definition
defines port based authentication prior to allowing client network access. |
|
|
Term
|
Definition
uses the public key to identify the data's source. Asymmetric encryption. |
|
|
Term
|
Definition
an encrypted message that uses both secret key and public key cryptography methods. A secret symmetric key is used to encrypt and decrypt the message, but the public key method is used to send the secret key to the other party. |
|
|
Term
|
Definition
uses the public key to verify the data's integrity. |
|
|
Term
|
Definition
the attacker uses a precomputed lookup table of all possible passwords and their matching hashes. |
|
|
Term
|
Definition
an attacker obtains the hash of a user password and presents the hash (without cracking it) to authenticate to network protocols. |
|
|
Term
|
Definition
attack that compares encrypted passwords against a predetermined list of possible password values |
|
|
Term
|
Definition
the additional time that it takes to restore data from backup, reintegrate different systems and test overall functionality |
|
|
Term
|
Definition
Challenge-Handshake Authentication Protocol (CHAP) is an identity verification protocol that does not rely on sending a shared secret between the access-requesting party and the identity-verifying party (the authenticator). CHAP is based on a shared secret, but in order to authenticate, the authenticator sends a “challenge” message to the access-requesting party, which responds with a value calculated using a “one-way hash” function |
|
|
Term
|
Definition
Windows NT LAN Manager (NTLM) is a challenge-response authentication protocol used to authenticate a client to a resource on an Active Directory domain. When the client requests access to a service associated with the domain, the service sends a challenge to the client, requiring that the client to perform a mathematical operation using its authentication token, and then return the result |
|
|
Term
|
Definition
Internet Key Exchange (IKE) is the protocol used to set up a secure, authenticated communications channel between two parties. IKE typically uses X.509 PKI certificates for authentication and the Diffie–Hellman key exchange protocol to set up a shared session secret. IKE is part of the Internet Security Protocol (IPSec) |
|
|
Term
|
Definition
Extensible Authentication Protocol (EAP) is an authentication framework, not a specific authentication mechanism, frequently used in wireless networks and point-to-point connections. It provides some common functions and negotiation of authentication methods called EAP methods. The EAP protocol can support multiple authentication mechanisms without having to pre-negotiate a particular one. There are currently about 40 different methods defined. |
|
|