Shared Flashcard Set

Details

Security+501
Security+
35
Computer Science
Beginner
11/10/2020

Additional Computer Science Flashcards

 


 

Cards

Term
RPO
Definition
Recovery Point Objective (RPO)
is a measure of how frequently you take backups.
RPO refers to the amount of data the business can afford to lose
Term
RTO
Definition
Recovery Time Objective (RTO)
is the amount of downtime a business can tolerate.
RTO = Downtime. RTO states how much downtime an application experiences before there is a measurable business loss.
Term
MTTR
Definition
Mean Time To Repair, is the time it takes to run a repair after the occurrence of the failure.
Term
MTBF
Definition
Mean Time Between Failures, is a metric that concerns the average time elapsed between a failure and the next time it occurs.
Term
Privacy Threshold Analysis
Definition
PTA => to help a company's departments gauge their system's information, and determine how to appropriately treat data that has been acquired by the organization.
Identify if PII is present
Term
Privacy Impact Assessment
Definition
The objective of the PIA is to systematically identify the risks and potential effects of collecting, maintaining, and disseminating PII and to examine and evaluate alternative processes for handling information to mitigate potential privacy risks.
This comes after PTA
Term
BCP
Definition
Business Continuity Plan include a BIA (Business Impact Analysis)
Term
BIA
Definition
Business Impact Analysis includes information potential monetary losses along with the impact on life, and the organization's reputation.
Term
STP
Definition
Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks
Term
RSTP
Definition
Rapid Spanning Tree Protocol - RSTP provides significantly faster recovery in response to network changes or failures, introducing new convergence behaviors and bridge port roles to do this.
with backward compatibility to legacy Spanning Tree (STP) 802.1D
Term
switch
Definition
a network switch can connect multiple devices and networks to expand the LAN.
Ethernet switch creates networks.
Network switches operate at layer two (Data Link Layer) of the OSI model.
Term
router
Definition
a router will allow you to share a single IP address among multiple network devices.
Routers operate at Layer 3 (Network) of the OSI model
The router allows for connections between networks
Term
PKI Security objectives
Definition
* Integrity
* Nonrepudiation
Term
Mutual Authentication
Definition
two or more parties authenticate each other
Term
Type 1: authentication factors
Definition
Type 1 – Something You Know – includes passwords, PINs, combinations, code words, or secret handshakes. Anything that you can remember and then type, say, do, perform, or otherwise recall when needed falls into this category.
Term
Type 2: authentication factors
Definition
Type 2 – Something You Have – includes all items that are physical objects, such as keys, smart phones, smart cards, USB drives, and token devices. (A token device produces a time-based PIN or can compute a response from a challenge number issued by the server.).
Term
Type 3: authentication factors
Definition
Type 3 – Something You Are – includes any part of the human body that can be offered for verification, such as fingerprints, palm scanning, facial recognition, retina scans, iris scans, and voice verification.
Term
false positive
Definition
when an occurrence is flagged as malicious
Term
RADIUS
Definition
Remote Authentication Dial-In User Service servers are central user or authentication points on the network.
Authentication can occur in many ways, such as like EAP (Extensible Auth. Protocol) or CHAP (Challenge Handshake Auth. Protocol)
Term
Replay attack
Definition
attempts to replay the results of a previously successful session to gain access.
Term
Input validation helps against...
Definition
SQL injection
Term
TPM
Definition
Trusted Platform Module - the name of a chip that can store cryptographic keys, passwords, or certificates.
Term
"bare metal" hypervisor type
Definition
Type 1
Term
IEEE 802.1x standard
Definition
defines port based authentication prior to allowing client network access.
Term
Digital certificate
Definition
uses the public key to identify the data's source.
Asymmetric encryption.
Term
Digital envelope
Definition
an encrypted message that uses both secret key and public key cryptography methods. A secret symmetric key is used to encrypt and decrypt the message, but the public key method is used to send the secret key to the other party.
Term
Digital signature
Definition
uses the public key to verify the data's integrity.
Term
rainbow table attack
Definition
the attacker uses a precomputed lookup table of all possible passwords and their matching hashes.
Term
Pass-the-Hash (PTH)
Definition
an attacker obtains the hash of a user password and presents the hash (without cracking it) to authenticate to network protocols.
Term
dictionary attack
Definition
attack that compares encrypted passwords against a predetermined list of possible password values
Term
Work Recovery Time (WRT)
Definition
the additional time that it takes to restore data from backup, reintegrate different systems and test overall functionality
Term
CHAP
Definition
Challenge-Handshake Authentication Protocol (CHAP) is an identity verification protocol that does not rely on sending a shared secret between the access-requesting party and the identity-verifying party (the authenticator). CHAP is based on a shared secret, but in order to authenticate, the authenticator sends a “challenge” message to the access-requesting party, which responds with a value calculated using a “one-way hash” function
Term
NTLM
Definition
Windows NT LAN Manager (NTLM) is a challenge-response authentication protocol used to authenticate a client to a resource on an Active Directory domain. When the client requests access to a service associated with the domain, the service sends a challenge to the client, requiring that the client to perform a mathematical operation using its authentication token, and then return the result
Term
IKE
Definition
Internet Key Exchange (IKE) is the protocol used to set up a secure, authenticated communications channel between two parties. IKE typically uses X.509 PKI certificates for authentication and the Diffie–Hellman key exchange protocol to set up a shared session secret. IKE is part of the Internet Security Protocol (IPSec)
Term
EAP
Definition
Extensible Authentication Protocol (EAP) is an authentication framework, not a specific authentication mechanism, frequently used in wireless networks and point-to-point connections. It provides some common functions and negotiation of authentication methods called EAP methods. The EAP protocol can support multiple authentication mechanisms without having to pre-negotiate a particular one. There are currently about 40 different methods defined.
Supporting users have an ad free experience!