Upgrade to remove ads
Cyber Patriot Vocabulary General Security Terms
Terms in this set (14)
Challenge Handshake Authentication Protocol. A security feature defined by PPP that allows either or both endpoints on a link to authenticate the other device as a particular authorized device.
Encryption is the ability to take data and send the data in a form that is not readable by someone that intercepts this data.
The term referring to the IP Security protocols, which is an architecture for providing encryption and authentication services, usually when creating VPN services through an IP network.
A network device that can enforce network policies, about which internal networks can communicate with which external networks. Firewalls can also secure certain application flows to enforce application policies.
A username (with matching password), configured on a router or switch. It is considered local because it exists on the router or switch, and not on a remote server.
A useful tool, to capture information from Servers and Network infrastructure (Routers, switches and firewalls). Logs can be useful to analyze a security breach after the fact or help identify potential risks before a breach.
A secret value used in public/private key encryption systems. Either encrypts a value that can then be decrypted using the matching public key, or decrypts a value that was previously encrypted with the matching public key.
A publicly available value used in public/private key encryption systems. Either encrypts a value that can then be decrypted using the matching private key, or decrypts a value that was previously encrypted with the matching private key.
Network management traffic is often sent out-of-band (OOB). This means the traffic does not share the same network paths with user data traffic.
Secure Sockets Layer (SSL)
A security protocol that is integrated into commonly used web browsers that provides encryption and authentication services between the browser and a website.
A reference to a security key whose value is known by both the sender and receiver.
A syslog server takes system messages from network devices and stores these messages in a database. The syslog server also provides reporting capabilities on these system messages. Some can even respond to select system messages with certain actions such as emailing and paging.
The trap is a message type in SNMP. This message is proactively generated by the managed device. This message is based on thresholds configured by a network administrator.
Virtual private network (VPN)
A set of security protocols that, when implemented by two devices on either side of an unsecure network such as the Internet, can allow the devices to send data securely. VPNs provide privacy, device authentication, anti-replay services, and data integrity services.
YOU MIGHT ALSO LIKE...
Chapter 3 VPN Fundamentals
Key Terms to Virtualization and Cloud Computing
Chapter 6 Discovering the Internet
OTHER SETS BY THIS CREATOR
American Independence Review 2
Summer School 2019 Review 3
Summer School 2019 Final Review 2
THIS SET IS OFTEN IN FOLDERS WITH...
Cyber Patriot Vocabulary ACL Terms
Cyber Patriot Vocabulary Spanning Tree
Cyber Patriot Vocabulary Spanning Tree (Part 2)
Cyber Patriot Vocabulary General IP Netw…