Vocab Flashcards
(45 cards)
Tokenization
Process of turning a meaningful piece of data into a token that has no meaningful value if breached
Iaas (Infrastructure as a service)
Cloud computing that provides virtualized resources over the internet
PaaS (Platform as a service)
Third party provider delivers hardware and software tools over the internet
SaaS (Software as a service)
Cloud provider hosts applications and makes them available over the internet
Thin Client
A computer that runs from resources stored on a central server instead of a hard drive
Elasticity
Ability of an IT infrastructure to respond without jeopardizing availability, security, and performance.
Scalability
Ability of a process, network, or software to grow and manage demand
Key Strectching
Converting a password to a longer and more random key for cryptographic purposes
Elliptic-Curve Cryptography
Public key encryption technique that creates faster, smaller, and more efficient keys
Perfect Forward Secrcey
Encryption system that changes the keys to encrypt and decrypt frequently and automatically
DNNSSEC (Domain name system security extension)
Defend against techniques hackers use to direct computers to rogue websites and servers using SSH
S/MIME (Secure multipurpose internet mail extension)
Sending digitally signed and encrypted messages
SRTP (secure real-time protocol)
Uses encryption and authentication to minimize risk of DOS attacks and breaches
LADPS (lightweight directory access protocol over SSL)
Authenticate users from windows server and active directory over SSL
FTPS (File transfer protocol secure)
Secure file transfer protocol that allows businesses to connect securely with customers, users etc using TLS
SFTP (Secure file transfer protocol over SSH)
Secure file transfer protocol that runs over the SSH protocol
SNMPv3 (simple network management protocol v3)
Provides security with authentication and privacy
IPSec (internet protocol security)
Suit of protocols developed to ensure integrity, confidentiality, and authentication of data over the IP network
SQL (structured query language)
Standard database language which is used to create, maintain and retrieve the relational database
Directory Traversal
Web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application
Memory Leak
A program you run, fails to release memory that it has used
Integer Overflow
An arrhythmic error when the result of an integer operation does not fit within the allocated memory
Error Handling
Response and recovery procedures from error conditions present in a software application
Improper Input Handling
Term used to describe functions such as validation, sanitization, filter erroring, encoding and decoding of data