vocabularyI2L Flashcards

1
Q

IDEA

A

International Data Encryption Algorithm is a symmetric cryptographic algorithm developed as a stronger alternative to DES. IDEA is a block cipher that operates on 64-bit blocks, the key starts at 128 bits and is broken into 52 16-bit subkeys, and the subkeys are used to encrypt the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identification

A

A claim to be a valid subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS

A

An intrusion detection system inspects all network activity and identifies any suspicious patterns indicative of an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IEEE

A

The Institute of Electrical and Electronics Engineers is an organization composed of engineers, scientists, and students. The IEEE focuses on creating standards for the computer and electronics industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Illegal Content

A

The transfer of data from or to a protected machine, or the storage of illegal content on a protected machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IMAP

A

Internet Message Access Protocol is a protocol used by e-mail programs to gain access to e-mail and bulletin board messages that are stored on a mail server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident

A

Any actual or threatened violation of a security policy. An incident may or may not actually violate a statute or regulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Incremental Backup

A

A backup type that includes all files whose time/date stamp has changed since the last backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Inference

A

The ability to gain information about data at sensitivity levels for which a user is not cleared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Flow Model

A

A security model that controls all of the information flowing from object to subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information Warfare

A

The use of information or systems to deny or destroy an enemys information and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Infrastructure

A

Hardware including transmission media, telephone lines, cable, satellites, routers, and other devices that are used to control transmission paths. Infrastructure may also be the software used to manage transmission signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A

Part of the security triad that protects data from unauthorized modification by means of physical security or access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intellectual Property Law

A

Several types of laws which help to protect the intellectual property of individuals and organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intrusion Detection Control

A

An automated system that recognizes unusual activity and then sounds an alarm. An intrusion detection control can use a signature database or behavior detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IP Spoofing

A

An attack that replaces the true senders IP address with another IP address.

17
Q

IPSec

A

The Internet Protocol Security is an authentication and encryption algorithm that guarantees integrity and confidentiality of information.

18
Q

ISAKMP

A

Internet Security Association and Key Management Protocol is a protocol that provides background services for IPSec. It also provides a method to maintain security associations of IPSec machines.

19
Q

ISDN

A

Integrated Services Digital Network is the telephone company communication protocol that enables data, voice, and other traffic to travel across telephone networks.

20
Q

ISO

A

The International Organization for Standardization is an international organization that establishes global standards for protocols, communication, and information exchange. ISO is commonly and incorrectly referred to as the International Standards Organization.

21
Q

ISO/OSI Reference Model

A

The International Organization for Standardization Open Systems Interconnection reference model is a seven-layer network architecture model of communication for dissimilar machines. It is a multilayered system in which the protocols only speak to the upper or lower layer and each layer identifies specific network functions.

22
Q

ITSEC

A

Information Technology Security Evaluation Criteria is the criteria that preceded TCSEC and is used for evaluating functionality and assurance. ITSEC is only used in Europe.

23
Q

Java Applet

A

An applet that is a fully interpreted, multithreaded language written by Sun Microsystems in which distributed programs run on the client in a limited memory area called a sandbox.

24
Q

K1, K2, K3

A

The 3DES encryption keys.

25
Q

KDC

A

Key Distribution Center is a component of the Kerberos system which holds all cryptographic keys. The KDC must be communicated with at every phase in order to initiate any type of authentication.

26
Q

Kerberos

A

A product developed by MIT that provides authentication and message protection using one key to encrypt a message on one side and the same key to decrypt the message on the other side.

27
Q

Kernel

A

The core of the operating system that launches applications and manages memory, files, and time and date.

28
Q

Key

A

A value that is used by an algorithm to encrypt plaintext.

29
Q

Known Plaintext

A

A type of attack in which the attacker has a copy of the plaintext and ciphertext version of the protected file. These allow the user to analyze the relationship between the plaintext and ciphertext.

30
Q

L2F

A

Layer 2 Forwarding was designed by Cisco to enable VPDNs from home computers to the enterprise.

31
Q

L2TP

A

Layer 2 Tunneling Protocol is an extension of the PPTP. L2TP is used on the Internet to create private virtual circuits.

32
Q

LAN

A

A local area network is a data network covering a relatively small geographic area that is capable of high speeds and low occurrences of errors.

33
Q

Layering

A

A process of level isolation that defines several protection rings within a system. Each process or ring is assigned a specific level of access.

34
Q

Layering

A

A protection mechanism technique where layers of functionality are established with the most sensitive processes at the bottom layer. Each layer communicates with the other layers through well-defined, secure paths.

35
Q

Least Privilege

A

A concept that grants subjects only enough access for objects to perform the required tasks. The goal is to limit authorization creep.

36
Q

Lighting Control

A

The most basic and common physical control that is used for perimeter security. Lighting is illuminating an area and is best used in low-threat areas without jeopardizing other security controls.

37
Q

Local Environment

A

An environment in which the application or the application partition runs largely on one platform.

38
Q

Logic Bomb

A

An attack where a specific set of instructions is executed when a specific event occurs.

39
Q

Logical Data Flow

A

The manner in which data flows from a layer on the source machine to the same layer on the target machine.