Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
security fundamentals photo review
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (50)
information security layers
information security components analogy
vulnerability, threat actor, asset
race condition
two concurrent threat try to access same target
ransomware
functionality
crypto malware
encrypt entire drive
cryptographic process
rootkit
symmetric
also know as private key cryptography
image spam
stegonography
hide info inside image video (with statue of liberty
ECC (Elliptic Curve Cryptography)
good for mobile or low power device / base on curves
DSA (Digital Signature Algorithm)
OCSP stapling
check status of certificate in real time / add time stamp on it
CRL
all certificate that has been revoked, listed by serial number
CR
list of all certificate
CSR
certificate sign in request - verify name address of user
certificate details
3DES
M-of-N control is a technique used in:
man in the middle
DNS poisoning attack
Hierarchal trust model
asymmetric (public key) cryptography
SYN flood attack
bridge model
...
forward and reverse proxy
SIEM dashboard
DMZ With Two Firewalls (Figure 7-12)
distributed trust model
...
IEEE 802.1x process
Embedded systems
bollard
dictionary attack
unsecured man trap
managed body sensor network MBSN
key logger
domain/extended validation
...
security increases convenience decreases
...
certificate chaining
hypervisor
...
OSI/TCP IP
...
hard edge / blurred ednge
...
Piconet
...
centralized data log analyzer
WOC
...
Token
dynamic fingerprint scanner
residential keyed entry lock
Cipher lock
Cipher lock
Other sets by this creator
comprehensive 1- 50
51 terms
comprehenstive review 51- 100
50 terms
CHAPTER 12 - REVIEW
21 terms
chapter 12 - notes
59 terms