CEH Glossary 1 Flashcards
Learn key definitions / terms / concepts (88 cards)
802.11
Wireless LAN standards created by IEEE.
- 802.11a runs at up to 54 Mbps at 5 GHz,
- 802.11b runs at up to 11 Mbps at 2.4 GHz,
- 802.11g runs at up to 54 Mbps at 2.4 GHz, and
- 802.11n can run upward of 150 Mbps.
802.11i
A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
acceptable use policy (AUP)
Policy stating what users of a system can and cannot do with the organization’s assets.
access control list (ACL)
A method of defining what rights and permissions an entity has to a given resource.
In networking, access control lists are commonly associated with firewall and router traffic-filtering rules.
access creep
Occurs when authorized users accumulate excess privileges on a system because of moving from one position to another;
allowances accidentally remain with the account from position to position.
backdoor
A hidden capability in a system or program for bypassing normal computer authentication systems.
A backdoor can be purposeful or the result of malware or other attack.
banner grabbing
An enumeration technique used to provide information about a computer system;
generally used for operating system identification (also known as fingerprinting).
baseline
A point of reference used to mark an initial state in order to manage change.
cache
A storage buffer that transparently stores data so future requests for the same data can be served faster.
CAM table
Content addressable memory table.
A CAM table holds all the MAC-address-to-port mappings on a switch.
certificate
An electronic file used to verify a user’s identity, providing nonrepudiation throughout the system. It is also known as a digital certificate. I
t is also a set of data that uniquely identifies an entity.
Certificates contain the entity’s public key, serial number, version, subject, algorithm type, issuer, valid dates, and key usage details.
daisy chaining
A method of external testing whereby several systems or resources are used together to make an attack.
Data Encryption Standard (DES)
An outdated symmetric cipher encryption algorithm, previously approved by the U.S. government and used by business and civilian government agencies.
DES is no longer considered secure because of the ease with which the entire keyspace can be attempted using modern computing, thus making cracking the encryption easy.
Data Link layer
Layer 2 of the OSI reference model.
This layer provides reliable transit of data across a physical link.
The Data Link layer is concerned with physical addressing, network topology, access to the network medium, error detection, sequential delivery of frames, and flow control.
The Data Link layer is composed of two sublayers: the MAC and the LLC.
eavesdropping
The act of secretly listening to the private conversations of others without their consent.
This can also be done over telephone lines (wiretapping), e-mail, instant messaging, and other methods of communication considered private.
ECHO reply
A type 0 ICMP message used to reply to ECHO requests.
It is used with ping to verify Network layer connectivity between hosts.
EDGAR database
A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information.
The EDGAR database performs automated collection, validation, indexing, acceptance, and forwarding of submissions by companies and others who are required by law to file forms with the U.S. Securities and Exchange Commission.
The database is freely available to the public via the Internet and is a potential source of information for hackers.
false acceptance rate (FAR)
The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
false negative
A situation in which an IDS does not trigger on an event that was an intrusion attempt.
False negatives are considered more dangerous than false positives.
false positive
A situation in which an IDS or other sensor triggers on an event as an intrusion attempt, when it was actually legitimate traffic.
false rejection rate (FRR)
The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
gap analysis
A tool that helps a company compare its actual performance with its potential performance.
gateway
A device that provides access between two or more networks.
Gateways are typically used to connect dissimilar networks.
GET
A command used in HTTP and FTP to retrieve a file from a server.