Shared Flashcard Set

Details

security +
definitions
32
Computer Networking
Graduate
12/15/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
macro
Definition
uses office document motion
Term
Stealth
Definition
a virus that uses encryption technologies to hide the core code from detection(ski-mask)
Term
polymorphic
Definition
A virus that is able to modify all but the core code of a virus
Term
metamorphic
Definition
a virus that is able to completely refactor internal code to make itself different between each generation( a catipillar ro butterfly)
Term
hotfix
Definition
immediate limited release fix for a specific problem
Term
patch
Definition
When a hotfix because a problem for everyone(or enough people)
Term
Service pack
Definition
a collection of patches ,updates hotfixes, and upgrades
Term
Template
Definition
recommended or approved collection of setting
Term
baseline
Definition
current minimum or acceptable values
Term
microsloth active x
Definition
lovel access to the system at the same priviliges as the user
Term
javasun microsystems
Definition
"applet" and "sandbox". full programming language "bytecode" java script developed by netscape designed to be used in a browser to provide dynamic experience
Term
Code injection
Definition
integrity attack, attempt to insert unvetted code into a system
Term
buffer overflow
Definition
code injection against an application which puts too much data into a memory location to attempt to overwrite a piece of critical system memory (a code injection attack)
Term
sql injection
Definition
code injection against a browser where unintended functions or communications occur (a code injection attack)
Term
Dmz
Definition
Physical architecture to create a sheltered network segment for public services
Term
VLAn
Definition
logical segmentation of networks for functional purposes
Term
NAT
Definition
process of converting one set of logical addresses into another
Term
Nat, Static
Definition
a 1-to-1 mapping of addresses between internal and external
Term
Securit
Definition
The combination of policies, procedures, technologies, and people used to enhance confidentiallity, integrit, and availibility
Term
object
Definition
target of interaction
Term
subject
Definition
source of interaction
Term
asset
Definition
a object of value
Term
privilege escalation
Definition
increased authorization without authentication
Term
privilige creep
Definition
unintended authorization typically through the implemention of job rotation
Term
System threats
Definition
Transport mechanism/carriers
Term
virus
Definition
Replicates within a object and need some form of subject interaction
Term
worm
Definition
self replicates and requires no subject interaction
Term
Trojan horse
Definition
appears to be an asset to entice subject interaction(ooo shiny)
Term
Logic Bomb
Definition
Transport mechanism that is dormant until triggered
Term
Spam
Definition
unsoliticed messages usually email
Term
adware
Definition
software with advertisement
Term
spyware
Definition
software that collects information about this subject
Supporting users have an ad free experience!