• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

AAA

Authentication, Authorization and auditing

Harris, p. 233

RADIUS

Remote Authentication Dial-In User Serivce

Harris, 234, 238

DAC

Discretionary Access Control

Harris, p. 220-221

MAC

Mandatory access control

Harris 221 - 223

RBAC

Role based access control

Harris, 224 - 227

IPS

intrusion prevention systems

Harris 265- 266

ACL

Access Control List

Harris 230 - 231

AES

Advanced Encryption Standard

Harris, p. 811

ASIC

Application specific integrated circuits

Harris, p. 18

ATM

Asynchronous Transfer Mode

Harris, p. 679 - 680

MTD

Maximum Tolerable Downtime

Harris, pp. 909- 910

BIA

Business Impact Analysis

Harris, 905 - 906

BSI

British Standards Institute


Build Security In

Harris, 36-37, 891, 893


Harris 1110-1111

ITIL

Information Technology Infrastructure Library - Processes allowing IT service management. Developed by UK office of Governance Commerce. Emphasizes relationship between IT and its "customers."

Harris, p. 60, 68

CA

Certificate Authority -- Regarding Public Key Infrastructure (PKI), the CA is a "third party" that's trusted. It signs the certificate and binds the indivdual's identity to the public key, taking the liability for authenticating the subject.

Harris, p. 834

PBX

Private branch exchange (p. 506, Stewart) -- phone like systems that need to be kept secure