Shared Flashcard Set

Details

Windows Security 2008 Vocabulary
Windows Security 2008 Vocabulary
17
Computer Networking
12th Grade
03/13/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
Media Access Control (MAC)
Definition
in the IEEE 802.x specifications, the lower of two sublayers that make up the ISO/OSI data link layer. The MAC manages access to the physical network, delimits frames, and handles error control.
Term
MAC Filters
Definition
a Wi-Fi network access point can be configured so that only preauthorized nodes, based upon their MAC addresses, may connect.
Term
Service Set Identifier (SSID)
Definition
a 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS (the communicating stations, or nodes, on a wireless LAN). An SSID is also referred to as a network name because essentially it is a name that identifies a wireless network.
Term
Wi-Fi Protected Access (WPA)
Definition
a Wi-Fi standard that was designed to improve upon the security features of WEP.
Term
Wired Equivalent Privacy (WEP)
Definition
an encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping.
Term
Authentication
Definition

the process of obtaining identification credentials such as name and password from a user and validating those credentials against some authority. If the credentials are valid, the entity that submitted the credentials is considered an authenticated identity.

Term
Kerberos
Definition
a network authentication protocol developed by MIT. Kerberos authenticates the identity of users attempting to log on to a network and encrypts their communications through secret-key cryptography.
Term
Lightweight Directory Access Protocol (LDAP)
Definition
a network protocol designed to work on TCP/IP stacks to extract information from a hierarchical directory such as X.500. This gives users a single tool to comb through data to find a particular piece of information, such as a user name, an e-mail address, a security certificate, or other contact information.
Term
Remote Authentication Dial-In User Service (RADIUS)
Definition
a proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link.
Term
Terminal Access Controller Access Control System (TACACS)
Definition
a network access technique in which users log into a single centralized server that contains a database of authorized accounts. After the access server authenticates the user, it forwards the login information to the data server requested by the user.
Term
Internet Zone
Definition
a zone (which on a LAN [local area network] is a subgroup of users within a larger group of interconnected networks) contains websites that are not on your computer or on your local intranet, or that are not already assigned to another zone. The default security level is medium.
Term
Secure Site
Definition
a website with the capability of providing secure transactions, ensuring that credit card numbers and other personal information will not be accessible to unauthorized parties.
Term
Web Page
Definition

a document on the World Wide Web. A Web page consists of an HTML file, with associated files for graphics and scripts, in a particular directory on a particular

machine (and thus identifiable by a URL).

Term
Website
Definition
a group of related HTML documents and associated files, scripts, and databases that is served up by an HTTP server on the World Wide Web.
Term
Access Controls
Definition
the mechanisms for limiting access to certain items of information or to certain controls based on users’ identities and their membership in various predefined groups. Access control is typically used by system administrators for controlling user access to network resources, such as servers, directories, and files.
Term
Keyloggers
Definition
keystroke logging (often called keylogging) is the process of recording the keys typed on a keyboard, typically without the users’ knowledge.
Term
Site Security
Definition
physical security is concerned with the protection of personal and business assets and premises through the use of security controls that restrict and manage the movement of people and equipment.
Supporting users have an ad free experience!