S Glossary Flashcards
(15 cards)
Scripting Language
Language that is run from the source code. All conversion to operation codes executable by the CPU is handled when it is needed
Security Policy
A high-level statement of the security objectives of an organization
Security Triad
3 Essential security properties:
Confidentiality
Integrity
Availability
SHA
Used to generate a cryptographic hash
Secure Hash Algorithm
SIEM
Used to aggregate multiple sources of security-related data so that data can be correlated to generate actionable alerts
Secuirty Info and Event Management
shellcode
A fragment of executable code used to get an attacker access to a system
SMB
A protocol used for file sharing and system management in a Windows environment
Server Message Block
Sniffing
Collecting network packets for decoding and analysis
SOA
A way of designing an application by breaking functions into separate, smaller services
Service Oriented Architecture
Social Engineering
Getting a user to perform an action or give up info they shouldn’t
Spoofing
Pretending to be a system or user other than the one you are
SQL
Used to programmatically interact with relational databases
Structured Query Language
Star Network
A network topology in which all endpoints connect to a central device
Subnet Mask
A 4 - octet value indicating which part of an IP address is network and which is host
SYN Scan
A port scanning technique targeting TCP ports by sending a SYN request