Vocabulary Flashcards
(77 cards)
access control list (ACL)
The collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write, and so on).
access point (AP)
A device that provides a connection between wireless devices and can connect to wired networks, implementing an infrastructure mode WLAN.
accounting
Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.
advanced encryption standard (AES)
Symmetric 128-, 192-, or 256-bit block cipher used for bulk encryption in modern security standards, such as WPA2, WPA3, and TLS.
advanced technology extended (ATX)
Standard PC case, motherboard, and power supply specification. Mini-, Micro-, and Flex-ATX specify smaller board designs.
air-gapped
A type of network isolation that physically separates a host from other hosts or a network from all other networks.
algorithm
Operations that transform a plaintext into a ciphertext with cryptographic properties, also called a cipher. There are symmetric, asymmetric, and hash cipher types.
algorithms
Operations that transform a plaintext into a ciphertext with cryptographic properties, also called a cipher. There are symmetric, asymmetric, and hash cipher types.
american standard code for information interchange (ASCII)
7-bit code page mapping binary values to character glyphs. Standard ASCII can represent 127 characters, though some values are reserved for non-printing control characters.
antivirus software
Inspecting traffic to locate and block viruses.
array
Identifier for a group of variables of the same type. The number of possible elements in an array is fixed when the array is declared.
artificial intelligence
The science of creating machines with the ability to develop problem-solving and analysis strategies without significant human direction or intervention.
assembly language
A compiled software program is converted to binary machine code using the instruction set of the CPU platform. Assembly language is this machine code represented in human-readable text.
attenuation
Attenuation, or degradation of a signal as it travels over media, determines the maximum distance for a particular media type at a given bit rate.
augmented reality (AR)
Using software and smartphone cameras or headsets to interact with real-world objects and images or change the way they appear in some way.
authentication
A method of validating a particular entity’s or individual’s unique credentials.
authorization
The process of determining what rights and privileges a particular entity has.
availability
The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need.
backdoors
A mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.
bandwidth
Generally used to refer to the amount of data that can be transferred through a connection over a given period. Bandwidth more properly means the range of frequencies supported by transmission media, measured in Hertz.
basic input/output system (BIOS)
Legacy 32-bit firmware type that initializes hardware and provides a system setup interface for configuring boot devices and other hardware settings.
biometric authentication
An authentication mechanism that allows a user to perform a biometric scan to operate an entry or access system. Physical characteristics stored as a digital data template can be used to authenticate a user. Typical features used include facial pattern, iris, retina, fingerprint pattern, and signature recognition.
bit
The fundamental unit of data storage is the bit (b) which can represent 1 or 0.
blu-ray
Latest generation of optical drive technology, with disc capacity of 25 GB per layer. Transfer rates are measured in multiples of 36 MB/s.