Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
this proves that a user or system is actually who they say they are. this is one on the more critical parts of a security system
|
authentication
|
|
one of the simplest forms of user authentication, the username and password values are both sent to the server as clear text then checked for a match`
|
PAP
|
|
an authentication mathod that challenges a system to verify identities. it doesnt use a user id/password, instead the server "challenges" a client to provide a shared "secret" id.
|
CHAP
|
|
a common form of authentication, this method requires the use of a certificate authority to issue a "pass" that will be accepted by the challenging system.
|
certificates
|
|
an authentication protocol that uses a key distribution center to "oversee" the authentication process. the standard in windows systems since windows 2000
|
kerberos
|
|
a type of id badge or card that gives you access to resources within a company. this can include building, parking lots and computers. many require the use of a pin in case the card is lost or stolen
|
smart card
|
|
devices that use physical characteristics to identifly a user and include: hand held scanner, retinal scanners and possibly (in the future) dna scanners
|
biometric devices
|
|
a type of malware that differs from most types, in that it works- often actively - on behalf of a third party. it is spread to machines by users who inadvertently ask for by downloading other programs, visiting infected sites, etc. the program monitors the users activity: sites visited, credit card numbers etc.
|
spyware
|
|
a program that enters a system or network under the guies of another program. often may be inluded as an attachmets or as part of an installation program.
|
trojan virus
|
|
a type of virus that can reproduce itself, is self-contained and doesnt need a host application to be transported
|
worm
|
|
a device that is the first line of defense in a network; it restricts traffic between local networks and the internet
|
firewall
|
|
the security layer of wap which provides authentication, encryption and data intergrity for wireless devices
|
wtls
|
|
an algorithum method which requires both ends of an encrypted messageto have the same file encryption key and processing algorithm. also known as private key encryption.
|
symmetric encryption
|
|
an algorithm method which uses two file encryption keys: a "public key" is used to encrypt the data, while a "private key" s used to decrypt it. also known as a public key encryption
|
asymmetric encryption
|
|
a type of backup that backs up all files that have their active bits turned on, meaning that they have been changed since the last backup. this type of backup turns the archive bits off after the files have been backed up.
|
incremental backup
|
|
similar to an incremental backup, this backup type backs up the files that have been changed since the last back up. this type of backup does not change the state of the archive bit.
|
differential backup
|
|
the process in which an attackerattempts to aquire information about your network and system by "social"means, such as talking to people in the orginization and misrepresenting themselves.
|
social engineering
|
|
the method used to insure that users of your network can access only what they are authorized to acess. this is usually spelled out in a orginizations security policies and standards
|
access control
|
|
an access control model designed by the military to address the storage and protection of classified information. designed to prevent unauthorized access to classified information
|
bell la-padula model
|
|
a high speed channel for transmitting data, made of high-purity glass sealed within an opaque tube. much faster then conventional copper wire such as coaxial cable
|
fiber optic
|
|
a standard port recommendation by the electronics industry association for serial devices
|
RS-232C
|
|
a device that filters and forwards traffic based on some criteria. a bridge and a router are both examples of switches
|
switch
|
|
the technology that encapsulates voice traffic into ip packets and transmits it accross a tcip/ip network
|
VoIP
|
|
a device that connects two networks and passes traffic between them based only on the node address, so that traffic between nodes on one network does not appear on the other network. for example, an Ethernet bridge only looks at the Ethernet address
|
bridge
|
|
a device connection separate networks that forwards a packet from one network to another based on the network address for the protocol being used. for exaplme, an ip router looks only at the ip network number. routers perate at layer 3 (network) of the osi seven-layer model
|
router
|