Security+ Terminology Flashcards
(344 cards)
3-leg perimeter
A type of DMZ where a firewall has three legs that connect to the LAN, the Internet, and the DMZ.
10 tape rotation
A backup rotation scheme in which ten backup tapes are used over the course of two weeks.
802.1X
An authentication technology used to connect devices to a LAN or WLAN. It is an example of port‐based network access control (NAC).
acceptable use
Often defined as a policy, acceptable use defines the rules that restrict how a computer, network, or other system may be used.
access control list (ACL)
A list of permissions attached to an object. ACLs specify what level of access a user, users, or groups have to an object. When dealing with firewalls, an ACL is a set of rules that applies to a list of network names, IP addresses, and port numbers.
access control model
Specifies methodologies by which admission to physical areas and, more importantly, computer systems, is managed and organized.
account expiration
The date when a user’s account they use to log on to the network expires.
accounting
The tracking of data, computer usage, and network resources. Often it means logging, auditing, and monitoring of the data and resources.
active interception
Normally refers to placing a computer between the sender and the receiver in an effort to capture and possibly modify information.
ad filtering
Ways of blocking and filtering out unwanted advertisements; pop‐up blockers and content filters are considered to be ad filtering methods.
Advanced Encryption Standard (AES)
An encryption standard used with WPA and WPA2. The
successor to DES/ 3DES and is another symmetric key encryption standard composed of three different
block ciphers: AES‐128, AES‐192, and AES‐256.
adware
Type of spyware that pops up advertisements based on what it has learned about the user.
algorithms
Well‐defined instructions that describe computations from their initial state to their final
state.
anomaly-based monitoring
Also known asstatistical anomaly‐based monitoring, establishes a performance baseline based on a set of normal network traffic evaluations.
AP isolation
Each client connected to the AP will not be able to communicate with each other, but they can each still access the Internet.
application black-listing
A method of disallowing one or more applications from use.
application firewall
A firewall that can control the traffic associated with specific applications. Works all the way up to the Application Layer of the OSI model.
application-level gateway (ALG)
Applies security mechanisms to specific applications, such as FTP and/or BitTorrent.
It supports address and port translation and checks whether the type of application traffic is allowed.
application white-listing
A method of restricting users to specific applications.
ARP poisoning
An attack that exploits Ethernet networks, and it may enable an attacker to sniff frames of information, modify that information, or stop it from getting to its intended destination.
asymmetric key algorithm
A type of cipher that uses a pair of different keys to encrypt and decrypt data.
attack vector
The path or means by which an attacker gains access to a computer.
audit trails
Records or logs that show the tracked actions of users, regardless of whether the users successfully completed the actions.
authentication
When a person’s identity is confirmed. Authentication is the verification of a person’s identity.