Vocab Flashcards
(414 cards)
AAA server
Used to establish secure access in a remote access vpn network
ANT
Wireless sensor protocol that enables communication between sensors and their controllers.
Access control
Selective restriction of access to an asset or a system/network resource
Access point
Used to connect devices to a wireless/wired network
Accounting
Method of keeping track of user actions on the network.
Admin Security controls
Management limitations, operational and accountability procedures, and other controls that ensure the security of an organization.
AES(advanced encryption standard)
National institute of standards and technology (NIST) specification for the encryption of electronic data.
Alert systems
Sends an alert message when any anomaly or misuse is detected.
Alarm system
Draw attention when a breach occurs or an attempt is made at a breach
Alert
A graduated event that notifies that a particular event(or series of) has reached a set threshold and requires action.
Anomaly detection
Detects intrusions based on fixed behavioral characteristics, of users and components within the system.
Anonymous proxy
Does not transfer info about the IP address of it’s user, hiding info about said user and their history.
Antenna
Converts between radio waves and electricity.
Anything as a service(XaaS)
Cloud and remote access service that offers anything as a service based on the demands of the user.
Application Containers
Used to run a single service. Posses layered file systems and are built on top of OS container technologies.
Application level gateway
Can filter packets at the application layer of the OSI model.
Application Proxy
Application-level proxy that works as a proxy server and filters connections for specific services.
Association
Process of connecting a wireless device to an AP
Asymmetric Encryption
Used two separate keys to carry of encryption and decryption.
Audit Trials
Set of records that provide documentary evidence of a systems activity.
Authentication
Ensures the identity of an individual is verified by the system or service.
Authorization
Process of providing permission to access the resources or perform an action on the network.
Availability
Ensures info is available to authorized parties without any disruption
Banwidth
The amount of info that can be broadcast over a connection