Flashcard Set 1
How to use the flashcards:
Click anywhere on the flashcard to reveal the answer.
Click on the arrows at the bottom of the flashcard set to move between flashcards.
Each flashcard set has 5 flashcards.
Define: Access Profile
An access profile is information about a user that is stored on a computer, including their password and name as well as what they are allowed access to.
Define: Access point
An access point is a computer networking device which allows a wi-fi compliant device to connect to a wired network and usually connects via a router.
Define: Acceptable use policy
Acceptable use policy is a policy that defines the level of access and degree of use of the organization’s network or internet by the members of an organization.
Define: Access path
An access path is a logical order that directs to the location on the computer where an object such as webpage, file etc., is stored.
What is an access control list?
A set of rules or instructions to inform the operating system about the access constraints for users or user groups, so that the operating system knows whether or not a user id has permission to access a file or a directory.
Define: Transmission control protocol tcp
Transmission control protocol (tcp) is a set of rules or protocol that is used along with the internet protocol to send data in the form of message units between computers over the internet. Whereas the ip protocol deals only with packets, tcp enables two hosts to establish a connection and exchange streams of data. Tcp takes care of keeping track of the individual units of data called packets. Tcp guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. It originated in the initial network implementation in which it complemented the internet protocol (ip). Therefore, the entire suite is commonly referred to as tcp/ip.
Define: Transport layer security tls
Transport layer security (tls) is a protocol that ensures privacy between communicating applications and the users on the internet. When a server and client communicate, tls ensures that no third party may overhear or tamper with any message. Tls is the successor to the secure sockets layer (ssl).
Define: Transport layer security tls
Transport layer security (tls) is a protocol that ensures privacy between communicating applications and the users on the internet. When a server and client communicate, tls ensures that no third party may overhear or tamper with any message. Tls is the successor to the secure sockets layer (ssl).
Define: Triple des
Triple des (3des) is the common name for the triple data encryption algorithm (tdea or triple dea) symmetric-key block cipher, which applies the data encryption standard (des) cipher algorithm three times to each data block. It transforms each 64-bit plaintext block by applying the des three successive times, using either two or three different keys, for an effective key length of 112 or 168 bits.
Define: Triple wrapped
Triple wrapped describes any data that has been signed with a digital signature, encrypted, and then signed again is called triple-wrapped.
Define: Advanced encryption standard aes
An advanced data encryption algorithm that employs key sizes of variable length in the range of 128 – 256 bits. Advanced encryption standards help protect highly sensitive data such as financial information, and classified government records.
Define: Administrative Safeguards
Administrative safeguards are a special set of the hipaa security rules. Administrative safeguards focus on internal organization, policies and procedures and the maintenance of security managers which are in place to protect sensitive patient information.
Define: Ad hoc network
An ad hoc network is a local area network (lan) that spontaneously builds as devices connect. An ad hoc network does not rely on a base station to coordinate different points, rather the individual base nodes forward packets to and from each other.
Define: Active security testing
Active security testing is security testing which involves directly interacting with a target, such as sending packets
Define: Active Security Testing
Active security testing is security testing which involves directly interacting with a target, such as sending packets
Define: Alert Situation
An alert situation is when the interruption in an enterprise is not resolved even after the competition of the threshold stage, an alert situation requires the enterprise to start escalation procedure.
Define: Adware
Adware is software distributed to the user free of cost with advertisements embedded into them. As such, it displays advertisements, and redirects your queries to sponsor’s websites. Adware helps advertisers collect data for marketing purposes, without your permissions to do so. A user can disable ad pop-ups by purchasing a registration key.
Define: Adversary
An adversary is a process, user or device that possesses a threat to the network.
Define: Advanced persistent threat
Advanced persistent threat is a user or a program that has highly sophisticated techniques and intends to pursue them with a malicious intent.
Define: Advanced penetration testing
Advanced penetration testing is the process of testing a network to discover vulnerabilities which make it open to harmful intruders; then addressing and remedying the issues.
Define: App attack
An app attack occurs when a user unknowingly installs a harmful app on their tablet or smartphone and the app in turn steals their personal data.
Define: Anti virus software
Antivirus software is a program or a set of programs that help prevent any malicious object, code, program from entering your computer or network. If any such malicious programs enter your computer, antivirus software helps detect, quarantine, or remove such programs from the computer or networks.
Define: Anti malware
Anti-malware is a program designed to protect computers and networks against any threats or attacks from viruses such as adware, spyware, and any such other malicious programs.
Define: Alternate process
An alternate process is a back-up process devised to help continue a business critical process without any interruption, from the time the primary enterprise system breaks down to the time of its restoration.
Alternate facilities
Alternate facilities are secondary facilities including offices, data processing centers etc., from where high- priority emergency tasks can be performed, delivered when primary facilities are interrupted, unavailable.
Attack
An attack is an action with malicious intention to interrupt the operations of a network or steal the data, etc.
Define: Asymmetric key public key
An asymmetric key (public key) is a security measure that uses two keys to ensure the confidentiality of a message. One key encrypts the message, while the other key decrypts it.
Define: Asset
An asset is the resources of an organization, business either having tangible value – finance, infrastructure, physical properties, human resource – or of intangible value such as goodwill that helps business and can be converted to cash for future use.
Define: Architecture
Architecture is a structure that defines or describes the very fundamentals of a system or an organization, its components, the relationship between each of these components, their relationship to the overall system, and finally, their effectiveness in guiding the system towards its goals.
Define: Application layer
An application layer is one of the seven layers in the open-system interconnection (osi) model of the tcp/ip protocol suite. Application layer defines the way process-to-process communication happens in a network; it only offers a strong communication interface and end user services.