Cards #151 - 200 Flashcards
(35 cards)
Full backup
complete, comprehensive backups of all files on a disk of server
Gateway
a bridge between two network
Hacker
unauthorized user who attempts to or gains access to an information system
Harassing
subject to aggressive pressure or intimidation
Hardware security
can be composed of adding cable locks to computers o prevent thieves from walking out with copies of customer database
Hash function
use one key for encryption and another for decrypting
Honeypot
computer system on the internet that is expressly set up to attract and “trap” intruders
Host integrity
the ability to define, enforce, and restore the security of client computers to keep enterprise networks and data secure
Host-based IDS
a software application installed on a system and monitors activity only on the local system (rely on information from audit and system log files to detect intrusion)
Hot site
up and operational 24/7 and would be able to take over functionally form a primary site within minutes of a primary site failure
How does NAT server help protect your network?
masking the IP addresses of internal computers from the internet
How does spyware differ from other forms of malware, such as worms and viruses
Not all spyware is malicious
HTTP
Hyper-Text Transfer Protocol. Used for websites
HTTPS
Hyper-Text Transfer Protocol over Secure Socket Layer. authentication of the server, the data transmitted over a HTTPS connection is encrypted and confidential
ICMP
Internet Control Message Protocol. used by a router to exchange information with other routers
Identification
identifying a person
Implicit deny
indicates that unless something is specifically allowed, it is denied
Bottleneck route
a network route that goes nowhere
RAID 1
data written identically to two drives, therefore producing a mirrored set
Incremental Backup
partial backup that stores only the info that has changed since the last full or incremental backup
Ingress filters
ensures that only packets with a valid source address from the originating network are allowed to pass
Instant Message
common communication using a computer. Opens listening ports on the computer, hence makes it vulnerable to network attacks and software exploits.
Internet
a global network connecting millions of computers; has more than 200 million users worldwide, and that number if growing rapidly
In-Private Filtering
filter potential unsafe websites you browse