• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
This proves that a user or system is actually who they say they are. this is one of the most critical parts of a security system.
Authentication
One of the simplest forms of user authentication, the username and password values are both sent to the server as clear text and checked for a match.
PAP
An authentication method that challenges a system to verify identities. It doesn't use a user ID/password, instead the server "challenges" a client to provide a shared "secret" ID.
CHAP
A common form of authentication, this method requires the use of a Certificate authority to ussue a "pass" that will be accepted by the challenging system.
Certificates
An authentication protocol that uses a key distribution center to "oversee" the authentication process. The standard in Windows systems since Windows 2000.
Kerberos
A type of ID Badge or card that gives you access to resources within a company. This can include building, parking lots and computers. Many require the use of a PIN in case the card is lost or stolen.
Smart Card
Devises that use physical characteristics to identify a user and include: hand held scanner, retinal scanners and possibly (in the future) DNA scanners.
Biometric Devices
A type of malware that difers from most types, in the it works - often actively - on behalf of a third party. It is spread to machines by users who inadvertently ask for by downloading other programs, visiting infected web sites, etc. the program monitors the user's activity: sites visited, credit card numbers entered, etc.
Spyware
A program that enters a system or network under the guise of another program. Often may be included as an attachment or as part of an installation program.
Trojan Virus
A type of viruse that can reproduce itself, is self-contained and doesn't need a host application to be transported.
Worm
A device that is the first line of defense in a network; it restricts traffic between a local networks and the Internet.
Firewall
The security layer of WAP which provides authentication, encryption and data integrity for wireless devices.
WTLS
An algorithm method which requires both ends of an encrypted message to have the same file encryption key and processing algorithm. Also known as Private Key Encryption.
Symmetric Encryption
An algorithm method which uses two file encryption keys: a "public key" is used to encrypt the data, while a "private key" is used to decrypt it. Also known as Public Key Encryption.
Asymmetric Encryption
A type of backup that backs up all files that have their archive bits turned on, meaning that they have been changed since the last backup. This type of backup turns the archive bits off after the files have been backed up.
Incremental Backup
Similar to an incremental backup, this backup type backs up the files that have been changed since the last backup. This type of backup does not change the state of the archive bit.
Differential Backup
The process in which an attacker attempts to acquire information about your network and system by "social" means, such as talking to people in the organization and misrepresenting themselves.
Social Engineering
The method used to ensure that users of your network can access only what they"re authorized to access. This is usually spelled out in the organization's security policies and standards.
Access Control
An access control model designed by the military to address the storage and protections of classified information. Designed to prevent unathorized access to classified information.
Bell La-Padula Method
A high-speed channel for transmitting data, made of high-purity glass sealed within an opaque tube. Much faster than conventional copper wire such as coaxial cable.
Fiber Optics
A standard port recommended by the Electronics Association for serial devices.
RS-232C
A device connecting seperate networks that forwards a packet from one network to another based on the network address for the protocol being used. For example, an IP router looks only at the IP network number. Routers operate at Layer 3 (Network) of the OSI seven-layer model.
Router
A device that filters and forwards traffic based on some criteria. A bridge and a router are both examples of switches.
Switch
The technology that encapsulates voice traffic into IP packets and transmits it across a TCP/IP network.
VoIP
A device that connects two networks and passes traffic between them based only on the node address, so that traffic between nodes on one network does not appear on the other network. For example, an Ethernet bridge only looks as the Ethernet address.
Bridge