Vocab Flashcards

(414 cards)

1
Q

AAA server

A

Used to establish secure access in a remote access vpn network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ANT

A

Wireless sensor protocol that enables communication between sensors and their controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control

A

Selective restriction of access to an asset or a system/network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access point

A

Used to connect devices to a wireless/wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accounting

A

Method of keeping track of user actions on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Admin Security controls

A

Management limitations, operational and accountability procedures, and other controls that ensure the security of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES(advanced encryption standard)

A

National institute of standards and technology (NIST) specification for the encryption of electronic data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Alert systems

A

Sends an alert message when any anomaly or misuse is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Alarm system

A

Draw attention when a breach occurs or an attempt is made at a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Alert

A

A graduated event that notifies that a particular event(or series of) has reached a set threshold and requires action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anomaly detection

A

Detects intrusions based on fixed behavioral characteristics, of users and components within the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Anonymous proxy

A

Does not transfer info about the IP address of it’s user, hiding info about said user and their history.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Antenna

A

Converts between radio waves and electricity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Anything as a service(XaaS)

A

Cloud and remote access service that offers anything as a service based on the demands of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application Containers

A

Used to run a single service. Posses layered file systems and are built on top of OS container technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application level gateway

A

Can filter packets at the application layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application Proxy

A

Application-level proxy that works as a proxy server and filters connections for specific services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Association

A

Process of connecting a wireless device to an AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Asymmetric Encryption

A

Used two separate keys to carry of encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Audit Trials

A

Set of records that provide documentary evidence of a systems activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authentication

A

Ensures the identity of an individual is verified by the system or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Authorization

A

Process of providing permission to access the resources or perform an action on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Availability

A

Ensures info is available to authorized parties without any disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Banwidth

A

The amount of info that can be broadcast over a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Basic Service Set Identifier(BSSID)
Media access control (MAC) address of an access point(AP) or base station that has set up a basic service Set(BSS).
26
Bastion Host
A computer system designed and configured to protect network resources from attacks.
27
Behavior-based IDS
Behavior based intrusion detection techniques assume an intrusion can be detected by observing a deviation from normal or expected behavior of the system of users.
28
Biometric Authentication
A technology which identifies human characteristics for authenticating people
29
Biometrics
An advanced and unique security technology that utilizes an individual's physical attributes such as fingerprint, iris, face, voice, and behavior for verifying their identity.
30
Bluetooth
With this tech data is transfered between cell phones, computers, and other networking devices over short distances.
31
Bollards
A short vertical post that controls and restricts motor vehicles.
32
Bring your own device(BYOD)
A policy that allows employees to bring their devices such as laptops, smartphones, and tablets to the workplace.
33
Business critical data
Info that contains critical data to business operations.
34
5G Cellular Communication
A broadband cellular network that operates at high bandwidth with low latency and provides high-speed data downloads.
35
CCMP
An encryption protocol used in WPA2 for stronger encryption and authentication.
36
Cellular Communication
Communication based on a single network tower that services devices located within it's radius.
37
Centralized Authorization
A single database for authorizing all the network resources or applications
38
Centralized IDS
In an centralized system, the data is gathered from different sites to a centralized one
39
Certification authorities(CA)
Trusted entities that issue digital certificates
40
Choose Your Own Device(CYOD)
A policy where employees select their device of choice from a pre-approved list, to access company data according to the chosen access privilege of the organization
41
Ciphers
An algorithm for performing encryption and decryption
42
Circuit level gateway
Work at the session layer of the OSI model, or the TCP layer of TCP/IP.
43
Client to client(Remote access) VPNs
Allow multiple hosts or clients to establish secure connections to a companies network over the internet
44
Cloud auditor
A party that performs an independent examination of cloud service controls to express an opinion
45
Cloud Broker
An entity that manages cloud services in terms of use, performance, and delivery, while maintaining the relationship between cloud providers and consumers
46
Cloud carrier
An intermediary that provides connectivity and transport services between CSPs and cloud consumers
47
Cloud computing
An on-demand delivery of IT capabilities where IT infrastructure and applications are provided to subscribers as a metered service over a network
48
Cloud consumer
Person or organization that uses cloud computing services
49
Cloud data backup
Storing backup data on storage provided by an online backup provider
50
Cloud layer
Servers hosted in the cloud accept, store and process the sensor data received from IoT gateways
51
Cloud platform
A person or organization providing services to interested parties via network access.
52
Cloud storage
A data storage medium used to store digital data in logistical pools using a network
53
Cloud to cloud (back end data sharing) communication model
Extends the device to cloud communication type such that the data from IoT devices can be accessed by authorized users
54
Combination locks
It has a combination of numbers and letters, that the user must use to open the lock.
55
Command console
Provides a user interface to the administrator for the purpose of receiving and analyzing security events, alerts, and log files.
56
Communication layer
(connectivity edge computing) the components of communication protocols and networks used for connectivity and edge computing.
57
Community cloud
Shared infrastructure shared between several organizations from a specific community with common concerns.
58
Company owned, Business only(COBO)
Refers to a policy that allows employees to use and manage the devices purchased by the organization but restrict the use of the device for business use only.
59
Compensating controls
Used as an alternative control when the intended control fails or is unavailable
60
Computer fraud and abuse act
Whoever access es a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer, and if the conduct involves an interstate or foreign communication, shall be punished under the act
61
Confidentiality
Ensures the info is not disclosed to any unauthorized persons.
62
Container
Refers to the virtualization based on the operating system, in which the kernels operating system is functionally replicated on multiple instances of isolated user space
63
Container as a service
A cloud computing model that provides containers and clusters as a service to it's subscribers
64
Containerization
A technique in which all personal and organizational data are segregated on a employees mobile device.
65
Context aware authentication
A type of enhanced security technique that uses the contextual information of a user for enhancing data security decisions.
66
Contraband
Materials banned from entering the environment
67
Corporate owned, personally enabled(COPE)
Refers to a policy that enables employees to use and manage devices purchased by the organization.
68
Cross-container attacks
Gaining access to a container and utilizing it to attack other containers of the same host or within the local network.
69
Cryptography
The practice of concealing info by converting it from plain text (readable format) into cyphertext (unreadable format) using a key or encryption scheme.
70
Data access control
Enables authentication and authorization of users access to data.
71
Data backup strategy
An ideal back up strategy involves steps ranging from selecting the right data to conducting a test data restoration drill.
72
Data backup
The process of making backup data of critical data such as physical and computer records.
73
Data destruction
Involves destroying the data so that it cannot be recovered and used for the wrong motive.
74
Data encryption standard(DES)
Designed to encipher and decipher blocks of data consisting of 64bits under control of a 56 bit key.
75
Data encryption
Protecting information so that it becomes unreadable for an unauthorized party
76
Data loss prevention(DPL)
A set of software products and processes that do not allow users to send confidential corporate data outside of the organization.
77
Data masking
Protecting information by obscuring specific areas of data with random characters or codes.
78
Data protection act of 2018(DPA)
An act to make provision for the regulation of the processing of information relating to individuals
79
Data resilience and backup
Making duplicates of critical data to be used for restoring and recovering purposes
80
Data retention
Securing data securly for compliance or business requirements
81
Data security
Involves the application of several security protocols to prevent any (un)intentional acts of data misuse, destruction, or modification.
82
Database honey pots
Employ fake databases that are vulnerable to perform database related attacks such as SQL injection and database enumeration
83
Decentralized authorization
Maintains a separate database for each resource
84
Demilitarized zone(DMZ)
A subnetwork is placed between the organizations private network such as a lan, and an outside network like the internet, and acts as another security layer.
85
Denial of service traffic signatures
Traffic containing certain traffic signatures that indicate a DoS attempt that floods a server with a large number of requests.
86
Detection controls
Used to detect unauthorized access attempts
87
Deterrence controls
Used to discourage the violation of security policies
88
Device layer
Layer of IoT that consists of hardware
89
Device to cloud communication
Devices communicate with the cloud directly, rather than communicating with a client to send or receive data commands.
90
Device to device communication
Inter connected devices interact with each other through the internet, but they predominantly use protocols such as ZigBee, zwave or bluetooth
91
Device to gateway communication
The IoT device communicates with an intermediate device called a gateway, which in turn communicates with a cloud device.
92
Differential data backup
All the data that has been changed since the last backup is copied over to the backup data.
93
Digital certificates
Allow a secure exchange of info between a sender and a reciever
94
Digital locks
Use fingerprint, smartcard, or pin on a keypad to unlock
95
Digital signature algorithm(DSA)
A federal information processing standard(FIPS) for digital signatures.
96
Digital Signature
Use of the asymmetric key algorithms to provide data integrity.
97
Dipole antenna
A straight electrical conductor measuring half a wavelength from end to end, and it is connected at the center of the radio frequency (RF) feed line.
98
Direct-sequence spread spectrum
DSSS is a spread spectrum technique that multiplies the original data signature with a pseudo random noise spreading code.
99
Directional antenna
Can broadcast and receive radio waves from a single direction.
100
Discretionary access control(DAC)
Determines the access control taken by any processor of an object in order to decide the access control of an subject on that object.
101
Disk encryption
Encryption of data stored in a physical or logical disk.
102
Distributed IDS
A distributed intrusion detection system (dIDS) consists of multiple IDSs over a large network.
103
Docker Networking
This type of networking architecture is developed on a set of interfaces known as container network model (CNM). Which provides application portability across heterogeneous infastuctures.
104
Docker Registry Attacks
Gaining access to the docker Registry.
105
Docker
An open source technology used for developing, packaging, and running applications and all it's dependencies in the form of containers, to ensure that the application works in a seamless environment.
106
Duel Firewall DMZ
The duel Firewall approach uses two firewalls to create a DMZ
107
EAP
The extensible authentication protocol(EAP) supports multiple authentication methods, such as token cards, kerberos and certificates.
108
Fabric virtualization
This level of virtualization makes the virtualization independent of the physical computer hardware.
109
EDGE
The EDGE is the main physical device in the IoT ecosystem that interacts with it's surroundings and contains various components like sensors, actuators, operating systems, hardware and network, and communication capabilities.
110
Face recognition
Compares and identifies a person on the basis of the facial features from an image or a video source.
111
Electric/Electro magnetic Locks
A locking mechanism that operates on an electrical current.
112
False-Negative (Attack -No Alert)
A condition that occurs when an IDS fails to react to an attack event.
113
Electromagnetic interface(EMI)
Occurs when an electronic device's performance is interrupted or degraded due to electromagnetic radiation or conduction.
114
False positive (No attack- alert)
Occurs if an event triggers an alarm without an actual attack occuring.
115
Email honeypots
Also known as email traps. These are fake emails designed to attract fake and malicious emails from advertiser's.
116
Fences/Electric Fences/Metal Rails
General marks of a restricted area, controlled areas and prevent unwanted access.
117
Encapsulation
The method in which protocols have separate functions to communicate among each other by hiding the data.
118
File system virtualization
Refers to virtualization at the layer where the filing system is present.
119
Encryption
The practice of concealing information by converting a plain text(readable format) into a cypher text (unreadable format) using a key or encryption scheme.
120
File level encryption
Encryption of data stored in files/folders.
121
Endpoint
This connects a sandbox to a network and abstracts the actual network from the application.
122
Fingerprint scanning
Compares two fingerprints for verification and identification on the basis of the patterns on the finger.
123
Enterprise information security policy
EISP drives an organizations scope and provides direction is there security policies.
124
Firewall
A software or, hardware or combination of both, which is generally used to separate a protected network from an unprotected public network.
125
Enterprise Mobility Management(EMM)
Consists of tools and technologies used in an organization to secure the data in an employees personal BYOD and organizational devices
126
Freedom of information act (FOIA)
Provided the general public the right to request access to record from any federal agency.
127
Explicit Authorization
Maintains separate authorization details for each requested resource request.
128
Frequency hopping spread spectrum (FHSS)
Also known as frequency hopping code division multiple access(FH-CDMA), a method of transmitting radio signals by rapidly switching a carrier among many frequency channels.
129
Full Data Backup
This is also called a normal backup. It copies all files and compresses them to save space.
130
Full device encription
A security feature that can encrypt all the information stored on any storage medium within a mobile device.
131
Full mesh VPN topology
In a fully meshed VPN network, all peers can communicate, with each other, making it a complex network.
132
Full virtualization network
In this type of virtualization, the guest OS is not aware that it is running a virtualized environment.
133
Function as a service (FaaS)
This cloud computing service provides a platform for developing, running, and managing application functionalities without the complexity of building and maintaining necessary infastucture.
134
General Data Protection Regulation (GDPR)
Levies harsh fines against those who violate it's privacy and security standards, with penalties reaching tens of millions of euros.
135
Hardware Firewalls
A dedicated stand-alone hardware device or it comes as part of a router
136
IDE
Integrated device electronics(IDE) allows the connection of two devices per channel. It is normally used for internal devices as the cables are large and flat.
137
Geofencing
A technique through which mobile application marketers use the location of the user to gather info.
138
Hardware VPNs
A dedicated hardware VPN application is used to connect routers and gateways to ensure communication over an insecure channel.
139
IPser server
Enhances VPN security through the use of strong encryption algorithms and authentication.
140
Geolocation
A technology that can identify the real-world geographical location of users or devices when connected to the internet.
141
Hash-based message Authentication Code(HMAC)
A type of message identification code(MAC) that uses a cryptographic key along with a cryptographic hash function.
142
ISM band
Set of frequencies for the international industrial, scientific, and medical community's.
143
Global positioning system (GPS)
A radio navigation and positioning system based on satellite communication
144
Health insurance portability and accountability act(HIPAA)
Provides federal protections for the individually identifyable health information held by covered entities and their business associates and gives patients an array of rights to that information.
145
Identity and Access Management (IAM)
Responsible for providing the right individual with the right information at the right time.
146
Global System for Mobile Communication (GSM)
A universal system used for Mobile data transmission in wireless networks worldwide.
147
High-Interaction Honeypots
Do not emulate anything; they run actual vulnerable services or software on production systems with real OS and applications
148
Identity-as-a-Service (IdaaS)
This cloud computing service offers authentication services to the subscribed enterprises and is managed by a third party vendor to provide identity and Access Management services.
149
Government Access to Keys (GAK)
Refers to the statuory obligation of individuals and organizations to disclose their cryptographic keys to the government agencies.
150
Honeynets
Networks of honeypots. They are very effective in determining the entire capabilities of adversaries.
151
Implicit Authentication
Provides access to resources indirectly
152
Gramm-leach-Bliley Act (GLBA)
A united states federal law that requires financial institutions to explain how they share and protect their customers private information.
153
Honey pot
An informational system resource that is expressly set up to attract people who attempt to penetrate a organization's network.
154
Incremental data backup
Only files that have been changed or created after the last backup are copied to the backup media
155
Guest Machine
Independent instance of an operating system created by virtual machine monitor.
156
Host Intrusion Detection Systems (HIDS)
Installed on a specific host in order to monitor, detect, and analyze events occurring on that host.
157
Information assurance (IA) Principles
Act as enablers for an organizations security activities to protect and defend it's network from security attacks.
158
Host Machine
Real physical machine that provide computing resources to support virtual machines.
159
Informational traffic signature
Traffic containing certain signatures that may be suspicious but might not be malicious.
160
Host based firewalls
Used to filter inbound/outbound traffic of a computer on which it is installed.
161
Infrared (IR)
A wireless technology for transferring data between devices in the digital form within a short range of up to 5 m.
162
Host backup (online)
Also called a dynamic backup or active backup. In a hot backup, the system continues to perform the backup even when the user is using the system.
163
Infrastructure Network Topology
Devices inside a wireless network are connected through an AP.
164
Hotspot
Places where wireless networks are available for public use.
165
Infrastructure-as-a-service (IaaS)
Provides virtual machines and other abstract hardware and operating systems which may be controlled through a service API.
166
Hub-and-Spoke VPN Topology
The main organization is considered the hub, and it's remote offices are considered the spokes.
167
Integrity
Ensures information is not tampered with or modified by unauthorized parties
168
Hybrid cloud
Combination of two or more clouds that remain unique entities but are bound together, thereby offering the benefits of multiple deployment models
169
Internal Bastion Host
It can be single homed or multihomes bastion hosts
170
Hybrid Intrusion Detection Systems (Hybrid IDS)
A combination of HIDS and NIDS
171
Internet Protocol Security (IPsec)
A network layer protocol that ensures a secure IP level communication.
172
Hybrid VPNs
Those with trusted VPNs as part of the secure VPNs. They implement different network components of an organization at the same time in order to confirm security at very low costs.
173
Internet of things (IoT)
Refers to computing devices that are web enabled and have the capability of sensing, collecting, and sending data using sensors, and the communication hardware and processors.
174
Hybrid Virtualization
The guest OS adopts the functionality of para virtualization and uses the VMM for binary translation to different types of hardware resources.
175
Interval-based IDS
Interval based or offline analysis refers to the storage of the intrusion-related info for further analysis.
176
Hypertext Transfer Protocol Secure (HTTPS)
Ensures secure communication between two computers over HTTP.
177
Intrusion Detection and Prevention System (IDS/IPS)
A network security appliance that inspects all inbound and outbound network traffic of suspicious patterns that might indicate a network or system security breach.
178
Hypervisor
An application or firmware that enables multiple guest operating systems to share a hosts resources.
179
IoT device Management
Helps security professionals to track, monitor, and manage physical IoT devices from a remote location.
180
IoT user management
Provide control over the users who have access to an IoT system.
181
Iris Scanning
Analyzes the colored part of the eye suspended behind the cornea.
182
Issue Specific Security Policy (ISSP)
Directs the audience on the usage of technology-based systems with the help of guidelines.
183
Kerberos
A network authentication protocol that is implemented for authentication requests in computer networks.
184
LEAP
A proprietary version of EAP developed by Cisco
185
Kibernetes
Also known as K8s, is an open source, portable, extensible, orchestration platform developed by Google for managing containerized applications and micro servers.
186
Lighting system
Adequate lighting should be provided inside,outside, and at the entrance of a building which helps seeing long distance during security patrols.
187
Logical segmentation
Utilizes VLANs, which are isolated logically without considering the physical location of devices.
188
Low-interaction Honeypots
Emulate only a limited number of services and applications of a target system or network.
189
MD5
This algorithm takes a message of arbitrary length as an input and then outputs a 128 bit-fingerprint or message digest of the input.
190
NAND flash memory
Provides a non-volatile storage for the RAID systems primary cache.
191
OS Assisted Virtualization or Para Virtualization
In this type of virtualization, the guest OS is aware of the virtual experiment in which it is running and communicates with the host Machine to request for resources.
192
MD6
Uses a merkle-tree-like structure to allow for large scale parallel computation of hashes for very long inputs.
193
Near field communication (NFC)
Covers very short distances. It employs electromagnetic induction to enable communication between devices connected within 10m.
194
OS Containers
Virtual environments sharing the kernal of the host environment that provides the isolated user space.
195
Malware Honeypots
Used to trap malware campaigns or malware attempts over network infastucture.
196
Network access controls
Offer various access control mechanisms for network devices like routers and switches
197
Onject
An explicit resource on which an access restriction is imposed.
198
Management consol
Interface used to access, configure, and manage the virtualization product.
199
Network access server (NAS)
Also known as a media gateway or a remote access server(RAS). It is responsible for setting up and maintaining each tunnel in a remote access VPN.
200
Off-site data backup
Storing data in a remote location such as a fire proof, indestructible safe.
201
Management server
Virtualization platform components used to directly manage the virtual machines and to simplify the administration of resources.
202
Network address translation(NAT)
Separates IP addresses Into two sets and enables lan to use these resources for internal and external traffic, respectively.
203
Omnidirectional antenna
Radiate electromagnetic (EM) energy in all directions.
204
Mandatory access control(MAC)
Determines the usage and access policies of users.
205
Network attached storage (NAS)
A file based data storage service and a dedicated computer appliance shared over the network.
206
Onsite data backup
Storing backup data at onsite data storage only.
207
Mantrap
A security system having an entry and exit door on opposite sides, separating secure and non-secure areas.
208
Network defense essentials(NDE)
A security program covering the fundamentals concepts of network security.
209
Open system authentication
A null authorization, algorithm that does not verify whether it's user or machine requesting network access.
210
Mechanical locks
Provide an easy method to restrict unauthorized access in an organization.
211
Network defense
To protect an organizations info, systems, and infastucture from unauthorized access, misuse, modification, service denial, or any other degredation and disruptions.
212
Operating system verification
Enables the hardware to execute multiple operating systems simultaneously
213
Medium-interaction honeypots
Simulate a real OS as well as applications and services of a target network.
214
Network Drivers
These are pluggable and provide actual implemention for the functioning of the network.
215
Operation
An action performed by a subject on an object
216
Mobile Application Management (MAM)
A software or service that enables network defenders to secure, manage, and distribute enterprise applications on employee mobile devices.
217
Network intrusion Detection System (NIDS)
Used to observe the traffic for any specific segment or device and recognize the occurrence of any suspicious activity on the network and application protocols.
218
Orthogonal Frequency-Division Multiplexing (OFDM)
Method of encoding digital data on multiple carrier frequencies.
219
Mobile content management (MCM)
Provide secure access to corporate data on tablets, smartphones, and other mobile devices.
220
Network Packets
A unit of data transmitted over a network for communication.
221
Mobile device Management (MDM)
Provides platforms for over-the-air or wired distribution of applications,data, and communication settings of all types for Mobile devices including mobile phones, smartphones, and tablet computers.
222
Network security controls
The security feature that should be appropriately configured and implemented to ensure network security.
223
Mobile Email Management
Ensure the security of corporate email infastucture and data.
224
Network security Devices
Devices that are deployed to protect computer networks from unwanted traffic and threats
225
Mobile security management
Involves actions and precautionary steps for securing the organizations data and mobile devices used by employees.
226
Network Security Protocols
Implement security related operations to ensure the security and integrity of data in transit.
227
Multi-cloud
A dynamic heterogeneous environment that combines workloads across multiple cloud vendors that are managed by one primary interface to ensure long term business goals.
228
Network segmentation
The practice of splitting a network into smaller network segments and separate groups of systems or applications from each other.
229
Multi-homed Bastion Host
A firewall device with at least two network interfaces.
230
Network sensors
Hardware and software components that monitor network traffic and trigger alarms if any abnormal activity is detected.
231
Multi-layer security
Prevents access to IoT by using multi-factor authentication (MFA), transport layer security (TLS), device identity management, ect.
232
Network traffic monitoring
A retrospective security approach that involves monitoring a network for abnormal activities, performance issues, bandwidth issues, ect.
233
Multiple-input, multiple output orthogonal Frequency-Division Multiplexing (MIMO-OFDM)
An air interface for 4g and 5g communications.
234
Network traffic signatures
A set of traffic characteristics such as a source/destination IP address, ports, transmission control protocol (TCP) flags, packet length, time to Live (TTL), and protocols. Signatures are used to define the type of activity on a network.
235
Multiport Memory controller(MC)
Provides access to memory in up to 8 ports. A memory controller can be present as a separate chip or as an integrated memory.
236
Network Virtualization
A process of combining all the available network resources and enabling security professionals to share these resources amongst the network users using a single administrative unit.
237
Network
A collection of endpoints that have connectivity between them.
238
Network-based firewalls
Used to filter inbound/outbound traffic from internal LAN.
239
Next Generation Firewall (NGFW)
A third generation firewall technology that moves beyond port/protocol inspection.
240
Non-Repudiation
Ensures that a party in communication cannot deny sending the message
241
Non-routing Duel-homed Hosts
This type of host is completely a firewall, or a component in a multi-faceted firewall.
242
Non-transparent proxy
Also known as explicit proxies and require client software to be configured to use the proxy server.
243
Normal Traffic Signatures
Acceptable traffic patterns allowed to enter the network
244
nvSRAM
The fastest non-volatile RAM in the industry with 20ns read and write access time.
245
Orthogonal Frequency-Division Multiplexing (OFDM)
Method of encoding digital data on multiple carrier frequencies
246
PEAP
A protocol that encapsulates the EAP within an encrypted and authenticated transport layer security (TLS) tunnel.
247
RADIUS
Remote authentication dial-in user service(RADIUS) an authentication protocol that provides centralized Authorization, Authentication, and Accounting (AAA) for remote access servers to communicate with a cent real server.
248
Packet Filtering Firewall
Work at the network level of the OSI model (or the IP layer of TCP/IP)
249
RAID Controller
Manages an array of physical disk drives and presents them to the computer as logical units.
250
Packet filters
Examine the routing info if the packets.
251
RAID level 0
Disk striping RAID 0 deals with data performance. In this level, data is broken into sections and written across multiple drives.
252
Parabolic grid antenna
Uses the same principles as a satellite dish, but does not have a solid dish. Consists of a semi-dish in the form of a grid of aluminum wires.
253
RAID level 1
Disk mirroring: multiple copies of data are written on multiple drives at the same time.
254
Paranoid policy
Forbids everything. There is a strict restriction on all company computers, whether it's in system or network usage.
255
RAID level 10
Blocks striped and mirrored: RAID 10 is a combination of RAID 0 (striping volume data) and RAID 1 (disk mirroring), and it's implementation requires at least four drives.
256
Password Authentication
A combination of a username and password to authenticate the network users.
257
RAID level 3
Disk Striping with parity: Data is striped at the byte level across multiple drives. One drive per set is taken up for parity info.
258
Password Blacklist
Contains a list of words that are prohibited from use as passwords because of their familiarity.
259
RAID level 5
Block Interval Distribution Parity: The data is striped at the byte level across multiple drives, and the parity info is distributed among all member drives.
260
Password Policy
Provides guidelines for using strong passwords for an organizations resources
261
RAID level 50
Mirroring and stripping across multiple RAID Levels: RAID level 50 includes mirroring and stripping across multiple RAID Levels.
262
Passwords and Pins
Basic security features used in all mobile devices.
263
RC4
A variable key size symmetric key stream cypher with byte oriented operations, and it is based on the use of random permutation.
264
Payment Card Industry Data Security Standard (PCI-DSS)
A proprietary information security standard for organizations that handle cardholder info for major debit, credit, prepaid, e-purse, ATM, and POS cards.
265
RC5
A parameterized algorithm with a variable block size, variable key size, and variable number of rounds. The key size is 128 bits.
266
Permissive policy
This policy is wide open, and only known dangerous services/attacks or behaviors are blocked.
267
RC6
A parameterized algorithm with a variable block size, key size, and number of rounds.
268
Physical Barriers
Restrict unauthorized persons from entering the building; always use a combination of barriers to discourage unauthorized entry.
269
RFID
The radio frequency identification (RFID) tech uses radio frequency (RF) electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects.
270
Physical Security Controls
Provide physical protection of the information, buildings, and all other physical assets of the organization.
271
Reactive Approach
Consists of methods or techniques that are used to detect attacks on the target network.
272
Physical security policy
Defines guidelines to ensure that adequate physical security measures are in place.
273
Real time analytics
Involves analyzing IoT things and taking steps accordingly.
274
Physical Security
Restricting physical access to the infrastructure, office premises, workstations, and employees of the organization.
275
Real-time monitoring
Involves monitoring IoT assets, processing products, maintaining a flow, helping detect issues, and taking actions immediately.
276
Physical Segmentation
A process for splitting a larger network into smaller physical components.
277
Real time IDS
Gathers and monitors information from network traffic regularly.
278
Platform-as-a-Service (PaaS)
A cloud computing service offers development tools, configuration management, and development platforms on-demand that can be used by subscribers to develop custom applications.
279
Reconnaissance Traffic Signatures
Consist of signatures that indicate an attempt to scan the network for possible weaknesses
280
Point-to-point VPN Topology
Any two endpoints are considered as peer devices which can communicate with each other. Any of the devices can be used to initiate the connection.
281
Recovery Controls
These controls are used in a more serious condition to recover from security violation and restore information and systems to a persistent state.
282
Point-to-Miltipoint Connection
(P2MP, PTMP, PMP) connection allows one-to-many connections by providing multiple paths from a single location to several other locations
283
Redundant Array of Independent Disks (RAID) Tech
A method of combining multiple hard drives into a single unit and writing data across several disk drives, offering fault tolerance.
284
Point-to-point (P2P) Connection
Enables secure communication between two mobile devices without data encryption.
285
Reference Monitor
Monitors the restrictions imposed on the basis of certain access control rules.
286
Policies
High-level statements dealing with the administrative network security of an organization.
287
Reflector Antennas
Used for concentrating electromagnetic energy that is radiated or received at a focal point.
288
Pretty Good Policies (PGP)
An application layer protocol which provides cryptographic privacy and authentication for network communication.
289
Registry
Contains all images that an organization deploys
290
Prevention controls
used to prevent unwanted or unauthorized access to resources.
291
Regulatory Frameworks
Contain a set of guidelines and best practices
292
Preventive Approach
Consists of methods or techniques that are used to avoid threats or attacks on the target network
293
Remote wipe
A technique used for securing and protecting data from miscreants if a mobile device used by an employee was stolen or lost.
294
Preventive controls
Prevent security violations and enforce various access control mechanisms.
295
Removable Media Encryption
Prevents removable Media devices from unauthorized access
296
Primary RAID Memory Cache
Cache is used to write the data in transition. A RAID system uses a cache to speed up I/O performance on the storage system.
297
Research Honeypots
Research Honeypots are High-Interaction Honeypots primarily deployed by research institutes, governments, or military organizations to gain detailed knowledge about the actions of intruders
298
Principle of least privilege (POLP)
Extends the need to know principle in providing access to a system
299
Response System
Issues countermeasures against any intrusion that is detected
300
Private cloud
A cloud operated infastucture operated by a single organization and implemented with a corporate firewall
301
Retinal scanning
Analyzes the layer of blood vessels at the back of their eyes to identify the person
302
Proactive approaches
Consists of methods or techniques that are used to make informed decisions on potential attacks in the future on the target network
303
Retrospective Approaches
Consist of methods or techniques that examine the causes for attacks, and contain, remediate, eradicate, and recover from damage caused by the attack on the target network
304
Process layer
Gathers info and processes the received information.
305
Reverse Proxy
Usually situated closer to the server(s) and will only return a configured set of resources.
306
Production Honeypots
Deployed inside the production network of the organization along with the other production servers
307
Rivets-Shamir-Adleman (RSA)
An internet encryption and authentication system that uses a algorithm developed by Ron Rivest, Adi Shamir, and Leonard Aldeman
308
Promiscuous Policy
Does not impose any restrictions on the usage of system resources
309
RBAC
In a role based access control, the access permissions are available based on the access policies determined by the system.
310
Protocol Anomaly Detection
Depends on the anomalies specific to a protocol
311
RB-RBAC
Role based access control gives permissions to a user role dynamically based on a set of rules defined by the admin.
312
Proxy servers
An application that serves as an intermediary when connecting with other computers
313
Prudent Policy
Starts with all services blocked. The Network defender enables safe and necessary services individually.
314
Public cloud
The provider makes services such as applications, servers, and data storage available to the public over the internet
315
Public key infrastructure (PKI)
A security architecture developed for increasing the confidentiality of the information exchanged over the internet.
316
Pure honeypots
Emulate the real production network of a target organization.
317
Push Notification Services
A messaging feature that originates from a server and enables the delivery of data or a message from an application to a mobile device without any explicit request from the user.
318
SATA
Serial ATA deals with hot plugging and serial connectivity. The hot plugging technique may be used to replace computer components without shutting down the system.
319
TACACS+
Provides authentication, authorization, and Accounting (AAA) services for network communication.
320
USA Patriot Act 2001
The purpose of the USA Patriot act is to deter and punish terrorist acts in the us and around the world and enhance law enforcement investigation tools.
321
SCSI
Small computer system interface (SCSI) allows multiple devices to be connected to a single port at the same time.
322
TKIP
A security protocol used in WPA as a replacement for WEP
323
Unauthorized Access Traffic Signatures
Traffic containing certain signatures that indicate an attempt to gain unauthorized access.
324
SDRAM
Dynamic Random Access memory (DRAM) that is synchronized with the CPU clock speed
325
Technical security controls
Used for restricting access to devices in an organization to protect the security of sensitive data
326
Universal serial bus (USB)
Enables wired communication for devices. It can be used for power supply and serial data transmission between devices
327
SHA-1
Produces a 160-bit digest from a message with a maximum length of (264 - 1) bits, and it resembles the MD5 algorithm.
328
The Digital Millennium Copyright Act (DMCA)
A united states copyright law that implements two 1996 treaties of the world intellectual property organization (WIPO).
329
User Behavior Analytics (UBA)
The process of tracking user Behavior to detect malicious attacks, potential threats, and financial fraud.
330
SHA-2
A family of two similar hash functions with different block sizes, namely, SHA-256, which uses 32-bit words, and SHA-512, which uses 64-bit words
331
The electronic communications privacy act
The electronic communications privacy act and the stored wire electronic communications act are commonly refered together as the electronic communications privacy act (ECPA) of 1986.
332
User identity management (IDM)
Deals with confirming the identity of a user, process, or device accessing the network
333
SHA-3
Uses the sponge construction, in which message blocks are XORed into the initial bits of the state, which is then invariably permutated.
334
The federal information security management act (FISMSA)
Provides a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets.
335
SOCKS Proxy
SOCKS, an internet Engineering Task Force (IETF) standard, is a proxy server that does not have the special caching abilities of a caching HTTP proxy server
336
The Federal Information act of 2000
Makes provision for the discloser of information held by public authorities or by persons providing services for them to amend the data protection act of 1998 and the public records act of 1958.
337
Sandbox
This contains the configuration of a containers network stack such as routing table, management of containers interfaces, and DNS settings.
338
The Human Rights act of 1998
Buttresses the rights and freedoms guaranteed under the European convention of human rights.
339
Sarbanes Oxley ACT (SOX)
Designed to protect investors and the public by increasing the accuracy and reliability of corporate disclosures.
340
Transparent proxy
A proxy through which a client system connects to a server without it's knowledge.
341
Satellite communication (SATCOM)
An artificial geostationary satellite that provides services across the globe, but it is much slower.
342
Transport Layer Security (TLS)
Ensures a secure communication between client-server applications over the internet
343
Screen Lock
A feature in mobile devices that is used to secure data and prevent illegal access by perpetrators
344
True negative (No attack- no alert)
A condition that occurs when an IDS identifies an activity as acceptable behavior, and the activity is acceptable
345
Secure hashing algorithm (SHA)
Generates a cryptographically secure one-way hash; it was published by the national institute of standards and technology as a US federal Information Processing standard
346
True positive (attack-alert)
A condition that occurs when an event is triggers an alarm and causes the IDS to react as if an attack is in progress.
347
Secure hypertext Transfer Protocol (S-HTTP)
An application layer level protocol that is used to encrypt web communications carried over HTTP
348
Turnstiles
Physical barrier that allows entry to one person at a time
349
Secure Sockets Layer (SSL)
A protocol used for providing a secure authentication mechanism between two communicating applications such as a client and server.
350
Two-factor authentication
A process where a system confirms the user identification in two steps.
351
Secure VPNs
Networks constructed using encryption
352
Secure/Multipurpose Internet Mail Extensions (S/MIME)
Application layer protocol which is used by sending digitally signed and encrypted email messages.
353
Security Incident and Event Management (SIEM)
Performs real time SOC(Security Operations Center) functions like identifying, monitoring, recording, auditing, and analyzing security incidents.
354
Security Monitoring
To address security breaches at early stages and to prevent malicious attacks on an IoT system.
355
Security Policy
A well documented set of plans, processes, procedures, standards, and guidelines required to establish an ideal information security status of an organization.
356
Security-as-a-Service (SECaaS)
Cloud computing model that integrates security services into corporate infastucture in a cost-effective way.
357
Separation of duties (SoD)
Breakdown of the authentication process into various steps.
358
Server virtualization
The logical partitioning of a servers hard drive.
359
Service Set Identifier (SSID)
A 32-alphanumeric-character unique identifier given to a WLAN that acts as a wireless identifier of the network.
360
Shared key Authentication
Each wireless station receives a shared secret key over a secure channel that is distinct from the 802.11 wireless network communication channels.
361
Shared Responsibility
Security is a shared Responsibility on cloud systems l, wherein the cloud consumer and service providers have varying levels of control over the available computing resources.
362
Signature Recognition
Also known as misuse detection, tries to identify events that indicate an abuse of the system or network resource
363
Simple network management protocol (SNMP) Polling
Used for identifying the IP devices attached to a wired network
364
Single Firewall DMZ
The network architecture containing the DMZ consists of three network interfaces.
365
Single Sign-on (SSO) authentication
Allows users to access multiple applications using a single username and password
366
Single homed bastion host
A firewall device with only one network interface
367
Site to site VPNs
Extends the companies network, allows access of the organizations network resources from multiple locations
368
Smart card authorization
A smart card consists of a small computer chip that stores personal info of the users identification
369
Software firewalls
A software program installed on a computer, just like normal software software
370
Software VPNs
VPN software is installed and configured on routers, servers and firewalls or as a gateway that functions as a VPN
371
Software as a service (SaaS)
Cloud computing service offers software to subscribers on demand over the internet
372
Spam honeypots
Specifically target spammers who abuse vulnerable resources such as open email relays and open proxies.
373
Spider honeypots
Also called spider traps. These honeypots are specifically designed to trap we crawlers and spiders
374
Standards
Comprise specific low-level mandatory controls or controls related to the implementation of a specific tech.
375
Star topology
Each device on the network is connected to a central hub that manages the traffic through the network
376
State full multi-layer inspection firewall
Combines the aspects of the other three types
377
Storage area network (SAN)
A specialized, dedicated, and discreet high speed network that connects storage devices with high speed I/O interconnect
378
Storage Device Virtualization
Virtualization of storage devices using techniques such as data striping and data mirroring
379
Subject
Defined as a user or a process that attempts to access objects
380
Symmetric encryption
Requires that both the sender and the receiver of the message have the same encryption key.
381
System access controls
Used for the restriction of access to data according to the sensitivity of data, clearance level of users, user rights, and permissions.
382
System Specific Security Policy (SSSP)
Directs users while configuring or maintaining a system
383
VPN Concentrators
A network device used to create secure VPN connections
384
WLAN
Connects users in a local area with a network. The area may range from a single room to an entire campus
385
VPN Topologies
Specifies how the peers and networks within a VPN are connected
386
WMAN
Accesses broadband area networks by using an exterior antenna. It is a good alternative to a fixed line network
387
Vein structure Recognition
Analyzes thickness and location of veins to identify a person
388
WPA2 Enterprise
Integrated EAP standards with WPA2 encryption.
389
Video Surveillance
Refers to Monitoring activities in and around the premises using CCTV (Close Circuit Television) systems.
390
WPA2
An upgrade to WPA, and it includes mandatory support for counter mode with cypher blocks chaining message Authentication Code protocol (CCMP), an AES-based encryption mode with strong security.
391
Virtual Private Network
A private network constructed using public networks, such as the internet.
392
WPA3
An advanced implementation of WPA2 providing trailblazing protocols and uses the AES-GCMP encryption algorithm.
393
Virtualization
Refers to a software-based virtual representation of an IT infastucture that includes network, devices, applications, storage, ect.
394
WPAN
Interconnects devices positioned around an individual, in which the connections are wireless. It has a very short range.
395
Voice Recognition
Identifies a person based on voice and speech patterns.
396
WWAN
Covers an area larger than the WLAN. It can cover a particular region,nation,or a globe.
397
Warm backup (Nearline)
The system updates are turned on to receive periodic updates.
398
Warning signs
Used to ensure someone does not inadvertently intrude on any restricted areas
399
Wi-Fi protected access (WPA)
An advanced encryption protocol using TKIP and message integrity check(MIC) to provide strong encryption and authentication
400
Wi-Fi
Radio waves or microwaves to allow electronic devices to exchange data or connect over the internet
401
WiMAX
The worldwide interoperability for microwave access (WiMAX) tech uses long range wireless networking and high speed internet
402
Windows Information Protection (WIP)
WIP has an endpoint data loss prevention (DLP) capability that can be helpful in protecting local data at rest on endpoint devices
403
Wired equivalent privacy (WEP)
A security protocol defined by the 802.11b standard; it was designed to provide wireless LAN with a level of security and privacy comparable to that of a wired LAN
404
Wired Network Scanning
Wired network scanners such as Nmap are used for identifying a large number of devices on a network by sending specifically crafted TCP packets to the device (Nmap-TCP fingerprinting).
405
Wireless bridge
Connects multiple LANs at the medium access control (MAC) layer.
406
Wireless Gateways
A key component of a wireless network. It is a device that allows Internet-enabled devices to access the network.
407
Wireless Modem
A device that allows PCs to connect to a wireless network and access the internet connection directly with the help of an ISP.
408
Wireless network cards (NIC)
Cards that locate and communicate to an AP with a powerful signal, giving network access to users.
409
Wireless Networks
Use radio frequency (RF) signals to connect wireless-enabled devices to a network
410
Wireless Repeater (range expanders)
The device retransmits the existing signal captured from the wireless router or an AP to create a new network.
411
Wireless Router
A device in a WLAN which interconnects two types of Networks using radio waves to the wireless enabled devices such as computers, laptops, and tablets.
412
Wireless Scanning
Performs an active wireless network scanning to detect the presence of wireless APs in the vicinity
413
Wireless USB Adapter
Connects different devices to a wireless network in order to access the internet without a computer, router, or any other network device.
414
Yagi antenna
Also called a Yagi-Uda antenna, is a unidirectional antenna commonly used in communications using the frequency band from 10 MHz to very high frequency (VHF) and ultra-high frequency (UHF)