Upgrade to remove ads
Terms in this set (26)
Access Control List (ACL)
A list of rights that an object has to resources in the network. Also can be referred to as a type of firewall. In this case, the lists reside on a router and determine which machines can use the router and in what direction.
A method of avoiding protocol restrictions by wrapping packets from one protocol in another protocol's frame and transmitting this encapsulated packet over a network that supports the wrapper protocol. See also encapsulation.
Ping of Death attack
Type of attack in which a large ICMP packet is sent to overflow the remote host's buffer. This usually causes the remote host to reboot or hang.
Point-to-Point Protocol (PPP)
The protocol used with dial-up connections to the Internet.
Its functions include error control, security, dynamic IP addressing, and support for multiple protocols.
Point-to-Point Tunneling Protocol (PPTP)
A protocol that allows the creation of virtual private networks (VPNs), which allow users to access a server on a corporate network over a secure, direct connection via the Internet.
Point-to-Point Protocol over Ethernet (PPPoE)
A PPP protocol that can be used over Ethernet for authentication purposes.
Asynchronous Transfer Mode (ATM)
A connection-oriented network architecture based on broadband ISDN technology that uses constant-size 53-byte cells instead of packets. Because cells don't change size, they are switched much faster and more efficiently than packets across a network.
certificate authority (CA)
An entity that issues digital certificates for use by other companies or institutions. A CA is a characteristic of many Public Key Infrastructure (PKI) schemes.
demilitarized zone (DMZ)
A physical or logical subnetwork that contains and exposes an organization's external services to a larger, untrusted network, usually the Internet. Named after the military usage of the term; also known as a demarcation zone or perimeter network.
demarcation point (demarc)
The point on any telephone installation where the telephone lines from the central office enter the customer's premises.
denial of service (DoS) attack
Type of hack that prevents any users—even legitimate
ones—from using the system.
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
Microsoft's version of CHAP, designed for authentication communications between Windows clients and servers. See also Challenge Handshake Authentication Protocol (CHAP).
Broadly, any communication between a single sender and multiple receivers. Unlike broadcast messages, which are sent to all addresses on a network, multicast messages
are sent to a defined subset of the network addresses; this subset has a group multicast address, which is specified in the packet's destination address field. See also broadcast address.
Software run on a host that gathers packets and analyzes them. Can also be referred to as a packet analyzer as well.
A method of switching that sends information as potentially smaller discrete packets, each one independently addressed for the intended recipient. Intermediate devices, such as switches and routers, can send these packets along one or more different paths to the same destination, making the autonomy of each packet imperative. A packetswitched connection is virtual, and the physical paths are shared, in contrast to the concept of the dedicated paths of circuit switching.
A type of intruder detection that logs all network events to a file for an administrator to view later.
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy
entity in an electronic communication.
Port Address Translation (PAT)
A process that allows a single IP address to represent
multiple resources by recording the source TCP or UDP port number.
A technology in which both the sender and the receiver have the same key. A single key is used to encrypt and decrypt all messages.
A technology that uses two keys to facilitate communication: a public key and a private key. The public key is used to encrypt a message to a receiver.
A type of firewall that prevents direct communication between a client and a host by acting as an intermediary.
A type of server that makes a single Internet connection and services
requests on behalf of many users.
Public Key Infrastructure (PKI)
A cryptography arrangement that binds public keys with
respective user identities by means of a certificate authority (CA) server.
The art of manipulating people into performing actions that divulge confidential information and compromise security.
A virus or other malicious process that hides within another, possibly trusted, program that the user executes without knowing the Trojan horse is embedded.
Execution of the host program generally launches the Trojan horse.
very high data-rate digital subscriber line (VDSL)
A DSL technology that provides faster data transmission over a single flat untwisted or twisted pair of copper wires. VDSL is capable of supporting high-bandwidth applications such as HDTV as well as telephone services
(Voice over IP) and general Internet access over a single connection.
Sets with similar terms
5.3 Explain methods of user authentication
Internet Chapter 6 Key Terms
Chapter 11: Securing TCP/IP
Network+ [Chapter 13]
Other sets by this creator
Forensics Chapter 4 & 5
Op System Security Ch. 1, 2, 3, 5