• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
this proves that a user or system is actually who they say they are. this is one on the more critical parts of a security system
authentication
one of the simplest forms of user authentication, the username and password values are both sent to the server as clear text then checked for a match`
PAP
an authentication mathod that challenges a system to verify identities. it doesnt use a user id/password, instead the server "challenges" a client to provide a shared "secret" id.
CHAP
a common form of authentication, this method requires the use of a certificate authority to issue a "pass" that will be accepted by the challenging system.
certificates
an authentication protocol that uses a key distribution center to "oversee" the authentication process. the standard in windows systems since windows 2000
kerberos
a type of id badge or card that gives you access to resources within a company. this can include building, parking lots and computers. many require the use of a pin in case the card is lost or stolen
smart card
devices that use physical characteristics to identifly a user and include: hand held scanner, retinal scanners and possibly (in the future) dna scanners
biometric devices
a type of malware that differs from most types, in that it works- often actively - on behalf of a third party. it is spread to machines by users who inadvertently ask for by downloading other programs, visiting infected sites, etc. the program monitors the users activity: sites visited, credit card numbers etc.
spyware
a program that enters a system or network under the guies of another program. often may be inluded as an attachmets or as part of an installation program.
trojan virus
a type of virus that can reproduce itself, is self-contained and doesnt need a host application to be transported
worm
a device that is the first line of defense in a network; it restricts traffic between local networks and the internet
firewall
the security layer of wap which provides authentication, encryption and data intergrity for wireless devices
wtls
an algorithum method which requires both ends of an encrypted messageto have the same file encryption key and processing algorithm. also known as private key encryption.
symmetric encryption
an algorithm method which uses two file encryption keys: a "public key" is used to encrypt the data, while a "private key" s used to decrypt it. also known as a public key encryption
asymmetric encryption
a type of backup that backs up all files that have their active bits turned on, meaning that they have been changed since the last backup. this type of backup turns the archive bits off after the files have been backed up.
incremental backup
similar to an incremental backup, this backup type backs up the files that have been changed since the last back up. this type of backup does not change the state of the archive bit.
differential backup
the process in which an attackerattempts to aquire information about your network and system by "social"means, such as talking to people in the orginization and misrepresenting themselves.
social engineering
the method used to insure that users of your network can access only what they are authorized to acess. this is usually spelled out in a orginizations security policies and standards
access control
an access control model designed by the military to address the storage and protection of classified information. designed to prevent unauthorized access to classified information
bell la-padula model
a high speed channel for transmitting data, made of high-purity glass sealed within an opaque tube. much faster then conventional copper wire such as coaxial cable
fiber optic
a standard port recommendation by the electronics industry association for serial devices
RS-232C
a device that filters and forwards traffic based on some criteria. a bridge and a router are both examples of switches
switch
the technology that encapsulates voice traffic into ip packets and transmits it accross a tcip/ip network
VoIP
a device that connects two networks and passes traffic between them based only on the node address, so that traffic between nodes on one network does not appear on the other network. for example, an Ethernet bridge only looks at the Ethernet address
bridge
a device connection separate networks that forwards a packet from one network to another based on the network address for the protocol being used. for exaplme, an ip router looks only at the ip network number. routers perate at layer 3 (network) of the osi seven-layer model
router