Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
- 3rd side (hint)
AAA |
Authentication, Authorization and auditing |
Harris, p. 233 |
|
RADIUS |
Remote Authentication Dial-In User Serivce |
Harris, 234, 238 |
|
DAC |
Discretionary Access Control |
Harris, p. 220-221 |
|
MAC |
Mandatory access control |
Harris 221 - 223 |
|
RBAC |
Role based access control |
Harris, 224 - 227 |
|
IPS |
intrusion prevention systems |
Harris 265- 266 |
|
ACL |
Access Control List |
Harris 230 - 231 |
|
AES |
Advanced Encryption Standard |
Harris, p. 811 |
|
ASIC |
Application specific integrated circuits |
Harris, p. 18 |
|
ATM |
Asynchronous Transfer Mode |
Harris, p. 679 - 680 |
|
MTD |
Maximum Tolerable Downtime |
Harris, pp. 909- 910 |
|
BIA |
Business Impact Analysis |
Harris, 905 - 906 |
|
BSI |
British Standards Institute Build Security In |
Harris, 36-37, 891, 893 Harris 1110-1111 |
|
ITIL |
Information Technology Infrastructure Library - Processes allowing IT service management. Developed by UK office of Governance Commerce. Emphasizes relationship between IT and its "customers." |
Harris, p. 60, 68 |
|
CA |
Certificate Authority -- Regarding Public Key Infrastructure (PKI), the CA is a "third party" that's trusted. It signs the certificate and binds the indivdual's identity to the public key, taking the liability for authenticating the subject. |
Harris, p. 834 |
|
PBX |
Private branch exchange (p. 506, Stewart) -- phone like systems that need to be kept secure |
|