Search
Browse
Create
Log in
Sign up
Log in
Sign up
Cyber Patriot Vocabulary General Security Terms
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (14)
CHAP
Challenge Handshake Authentication Protocol. A security feature defined by PPP that allows either or both endpoints on a link to authenticate the other device as a particular authorized device.
encryption
Encryption is the ability to take data and send the data in a form that is not readable by someone that intercepts this data.
IPsec
The term referring to the IP Security protocols, which is an architecture for providing encryption and authentication services, usually when creating VPN services through an IP network.
Firewall
A network device that can enforce network policies, about which internal networks can communicate with which external networks. Firewalls can also secure certain application flows to enforce application policies.
local username
A username (with matching password), configured on a router or switch. It is considered local because it exists on the router or switch, and not on a remote server.
logging
A useful tool, to capture information from Servers and Network infrastructure (Routers, switches and firewalls). Logs can be useful to analyze a security breach after the fact or help identify potential risks before a breach.
private key
A secret value used in public/private key encryption systems. Either encrypts a value that can then be decrypted using the matching public key, or decrypts a value that was previously encrypted with the matching public key.
public key
A publicly available value used in public/private key encryption systems. Either encrypts a value that can then be decrypted using the matching private key, or decrypts a value that was previously encrypted with the matching private key.
out-of-band
Network management traffic is often sent out-of-band (OOB). This means the traffic does not share the same network paths with user data traffic.
Secure Sockets Layer (SSL)
A security protocol that is integrated into commonly used web browsers that provides encryption and authentication services between the browser and a website.
shared key
A reference to a security key whose value is known by both the sender and receiver.
syslog
A syslog server takes system messages from network devices and stores these messages in a database. The syslog server also provides reporting capabilities on these system messages. Some can even respond to select system messages with certain actions such as emailing and paging.
trap
The trap is a message type in SNMP. This message is proactively generated by the managed device. This message is based on thresholds configured by a network administrator.
Virtual private network (VPN)
A set of security protocols that, when implemented by two devices on either side of an unsecure network such as the Internet, can allow the devices to send data securely. VPNs provide privacy, device authentication, anti-replay services, and data integrity services.
YOU MIGHT ALSO LIKE...
Cisco
24 Terms
Flash12347
Chapter 3 VPN Fundamentals
70 Terms
shishi_wang2
Key Terms to Virtualization and Cloud Computing
71 Terms
Kevin_Rose_843
Chapter 6 Discovering the Internet
96 Terms
bduncan021590
OTHER SETS BY THIS CREATOR
Early Humans
15 Terms
jskash
TEACHER
American Independence Review 2
20 Terms
jskash
TEACHER
Summer School 2019 Review 3
19 Terms
jskash
TEACHER
Summer School 2019 Final Review 2
23 Terms
jskash
TEACHER
THIS SET IS OFTEN IN FOLDERS WITH...
Cyber Patriot Vocabulary ACL Terms
7 Terms
jskash
TEACHER
Cyber Patriot Vocabulary Spanning Tree
12 Terms
jskash
TEACHER
Cyber Patriot Vocabulary Spanning Tree (Part 2)
9 Terms
jskash
TEACHER
Cyber Patriot Vocabulary General IP Networking Terms
19 Terms
jskash
TEACHER
;