Save
...
Cis Ch2
CIS CHAPTER 3
A-E
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Niña Kyla
Visit profile
Cards (26)
Access control list
:
It is an IT resource (computer directory, data file, program, or printer) that controls access to the resources.
Access
token
:
A key information about the user, including user ID, password, user group, and privileges granted to the user.
Advance encryption standard
(AES):
It is a
128-bit
encryption technique that has become a U.S. government standard for
private
key encryption.
Algorithm:
It is the procedure of shifting each letter in the clear text message the number of positions that the key
value
indicates.
Application-level firewall
:
A higher level of customizable network security.
Botnets
:
The collections of compromised computers.
Caesar cipher
:
The earliest encryption method which Julius Caesar is said to have used to send coded messages to his generals in the field.
Call-back device
:
Hardware component that asks the caller to enter a password and then breaks the connection to perform a security check.
Certification authority
(CA):
A digital certificate that is issued by a trusted third party.
Compiler:
Language translation modules of the operation system.
Data collision
:
Two or more signals are transmitted simultaneously that destroy both messages.
Data encryption standard
(
DES
):
An older encryption technique of
Triple-DES
encryption.
Deep packet inspection
(DPI):
An analytical and statistical techniques to evaluate the contents of message packets.
Denial
of
Service
(DoS):
It is an assault on a Web server to prevent it from servicing its legitimate users.
Digest
:
It is a mathematical value calculated from the text content of the message.
Digital certificate
:
A process that proves the message received was not tampered with during transmission.
Digital envelope
:
It
is the usage of
data
encryption
standard
(
DES
) and
Rivest-Shamir-Adleman
(
RSA
).
Digital signature
:
It is an electronic authentication that cannot be forged.
Discretionary
access
privileges
:
A grant access privileges to other users
Distributed denial of service
(DDoS):
A form of a SYN flood or smurf attack.
Echo check
:
Technique that involves the receiver of the message returning the message to the
sender.
EDE3
: A key to encrypt the message.
Electronic data interchange
(
EDI
):
The intercompany exchange of computer-processible business information in standard format.
EEE3
: Three different keys to encrypt the message
three
times.
Encryption
:
Technique that uses a computer program to transform a standard message being transmitted into a coded (cipher text) form.
Event
monitoring
:
A key activity related to system resources.