• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back
802.11i
A security extension to 802.11 and a successor toWi-Fi Protected Access that is the currently accepted best security protocol for wireless networks.
access control lists
Sets of rules defined by an administrator that determine which packets should be allowed and which should be denied.
authentication
A security feature that allows an administrator to control who has access to the network.
authorization
A security feature that allows an administrator to control what a user can do and which resources can be accessed after the user is authenticated to the network.
backdoor
A program installed on a computer that permits access to the computer, thus bypassing the normal authentication process.
cracker
Someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm.
denial-of-service (DoS) attack
An attempt to tie up network bandwidth or services so that network resources are rendered useless to legitimate users.
Encrypting File System (EFS)
A feature available on Windows operating systems that allows file contents to be encrypted on the disk. These files can be opened only by the file creator or designated agents.
encryption
A technology used to make data unusable and unreadable to anybody except authorized users of the data.
firewall
A hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.
hacker
Sometimes a derogatory term to describe an unskilled or undisciplined programmer. Hacker can also mean someone who is highly skilled with computer systems and programs and is able to use some of the same tools crackers use to poke around networks or systems, but not for evil purposes.
hoax virus
A type of virus that’s not really a virus but simply an e-mail announcement of a made-up virus. Its harm lies in people believing the announcement and forwarding the message on to others.
intrusion detection system (IDS)
Usually a component of a firewall, an IDS detects an attempted security breach and notifies the network administrator. An IDS can also take countermeasures to stop an attack in progress.
IP Security (IPSec)
An extension to the IP protocol suite that creates an encrypted and secure conversation between two hosts.
MAC address filtering
A security method often used in wireless networks, whereby only devices with MAC addresses specified by the administrator can gain access to the wireless network.
malware
Any software designed to cause harm or disruption to a computer system or otherwise perform activities on a computer without the consent of the computer’s owner.
NTFS permissions
Permissions assigned to files or folders on an NTFS-formatted volume in a Windows system. NTFS permissions affect user access to resources whether the user is logged on locally or over the network.
penetration tester
A term used to describe a security consultant who is able to detect holes in a system’s security for the purpose of correcting these vulnerabilities.
ping scanner
An automated method for pinging a range of IP addresses.
Pluggable Authentication Modules (PAM)
A software service used on many Linux distributions for authenticating users. PAM is extensible so that new authentication features can be added as needed.
port scanner
Software that determines which TCP and UDP ports are available on a computer or device.
protocol analyzers
Programs or devices that can capture packets traversing a network and display packet contents in a form useful to the user.
rootkits
Forms of Trojan programs that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords. They are among the most insidious form of Trojan software because they can mask that the system has been compromised by altering system files and drivers required for normal computer operation.
shadow passwords
A secure method of storing user passwords on a Linux system.
sharing permissions
A list of permissions that can be assigned to users and groups and applied to Windows shared folders. Sharing permissions don’t affect access to files and folders by users logged on locally to the system hosting the files.
spam
Unsolicited e-mail. The harm in spam is the loss of productivity when people receive dozens or hundreds of spam messages daily and the use of resources to receive and store spam on e-mail servers.
spoofed address
A source address inserted into a packet that is not the actual address of the sending station.
spyware
A type of malware that monitors or in some way controls part of your computer at the expense of your privacy and to the gain of some third party.
stateful packet inspection (SPI)
A filtering method used in a firewall, whereby packets are not simply filtered based on packet properties but also the context in which packets are being transmitted. If a packet is not part of a legitimate, ongoing data conversation, it’s denied.
Trojan program
A program that appears to be something useful, such as a free utility you can use on your computer, but in reality contains some type of malware.
virtual private networks (VPNs)
Temporary or permanent connections across a public network that use encryption technology to transmit and receive data.
virus
A malicious program that spreads by replicating itself into other programs or documents. A virus usually aims to disrupt computer or network functions by deleting and corrupting files.
wardrivers
Attackers who drive around with a laptop or PDA looking for wireless LANs to access.
Wi-Fi Protected Access (WPA)
A wireless security protocol that is the successor to Wired Equivalency Protocol. WPA has enhancements that make cracking the encryption code more difficult.
Wired Equivalency Protocol (WEP)
A form of wireless security that encrypts data so that unauthorized people receiving wireless network signals can’t interpret the data easily.
worm
A self-replicating program, similar to a virus, that uses network services such as e-mail to spread to other systems.