300 Flashcards
(100 cards)
A message and management protocol for TCP/IP
Internet Control Message Protocol (ICMP)
An international organization that works under the Internet Architecture Board to establish standards and protocols relatings to the Internet
Internet Engineering Task Force (IETF)
The network layer responsible for routing - IP addressing - and packaging
Internet layer
A protocol with a store-and-forward capability
Internet Message Access Protocol (IMAP)
The protocol in the TCP/IP suite responsible for network addressing
Internet Protocol (IP)
A set of protocols that enable encryption - authentication - and integrity over IP
Internet Protocol Security (IPSec)
A professional membership group composed primarily of Internet experts
Internet Society (ISOC)
The act of entering a system without authorization to do so
intrusion
Tools that identify and respond to attacks using defined rules or logic
intrusion detection system (IDS)
Penetration-type testing that involves trying to break into the network
intrusive tests
Making the data look as if it came from a trusted host when it didn’t (thus spoofing the IP address of the sending host)
IP spoofing
A protocol that enables the creation of storage area networks (SANs) and is used in sending storage-related commands over IP networks
iSCSI (Internet Small Computer Systems Interface)
An attack that involves looking at repeated results in order to crack the WEP secret key
IV attack
Purposely obstructing or interfering with a signal
jamming
A policy of rotating employees through various jobs
job rotation policy
The ability of a filesystem to use a log file of all changes and transactions that have occurred within a set period of time (for example - the last few houres) If a crash occurrs - the operating system can look at the log files to see what transactions have been committed and which ones have not
journaling
An authentication scheme that uses tickets (unique keys) embedded within messages
Kerberos
A principle that states that the security of an algorithm should depend only on the secrecy of the key and not on the secrecy of the algorithm itself
Kerckhoffs’s principle
An organization or facility that generates keys for users and is a part of Kerberos
key distribution center (KDC)
An agency that stores keys for the purpose of law-enforcement access
key escrow agency
A method of offering mutual authentication and establishing data encryption keys
Key Exchange Algorithm (KEA)
The act of creating keys for use by users
key generation
The temporary deferment of a key for a period of time (such as for a leave of absence
key suspension
The wait time between the call for an action or activity and the actual execution of that action
latency