Vocabulary2 Flashcards
(411 cards)
SPI
SPI Security Parameter Index?Used to identify simplex IPsec security associations.
SSL
SSL Secure Sockets Layer?Authenticates and provides confidentiality to network traffic such as Web traffic.
WPA
WPA Wi-Fi Protected Access?A partial implementation of 802.11i.
multitasking
Multitasking Allows multiple tasks (heavy weight processes) to run simultaneously on one CPU.
POTS
POTS Plain Old Telephone Service?Analog phone service.
virtual memory
Virtual memory Provides virtual address mapping between applications and hardware memory.
phishing
Phishing Malicious attack that poses as a legitimate site such as a bank, attempting to steal account credentials.
PVC
PVC Permanent Virtual Circuit?A circuit that is always connected.
SLE
SLE Single Loss Expectancy?The cost of a single loss.
striping
Striping Spreading data writes across multiple disks to achieve performance gains, used by some levels of RAID.
thin client applications
Thin client applications Uses a Web browser as a universal client, providing access to robust applications that are downloaded from the thin client server and run in the client?s browser.
reference monitor
Reference monitor Mediates all access between subjects and objects.
SOAP
SOAP Originally stood for Simple Object Access Protocol, now simply ?SOAP??Used to implement Web services.
T3
T3 28 Bundled T1s.
RFC 1918
RFC 1918 addresses Private IPv4 addresses that may be used for internal traffic.
social engineering
Social engineering Uses the human mind to bypass security controls.
star
Star Physical network topology that connects each node to a central device such as a hub or a switch.
Optimizing
Optimizing Phase 5 of CMM.
strong tranquility propery
Strong tranquility property Bell?LaPadula property that states that security labels will not change while the system is operating.
type 2 authentication
Type 2 authentication Something you have.
permutation
Permutation Provides confusion by rearranging the characters of the plaintext, anagram-style; also called transposition.
quantitative risk analysis
Quantitative risk analysis RA method that uses hard metrics such as dollars.
remote wipe
Remote wipe The ability to remotely erase a mobile device.
polymorphic virus
Polymorphic virus Virus that changes its signature upon infection of a new system, attempting to evade signature-based antivirus software.