A-E

Cards (26)

  • Access control list: 

    It is an IT resource (computer directory, data file, program, or printer) that controls access to the resources.
  • Access token: 

    A key information about the user, including user ID, password, user group, and privileges granted to the user.
  • Advance encryption standard (AES): 

    It is a 128-bit encryption technique that has become a U.S. government standard for private key encryption.
  • Algorithm:
    It is the procedure of shifting each letter in the clear text message the number of positions that the key value indicates.
  • Application-level firewall: 

    A higher level of customizable network security.
  • Botnets: 

    The collections of compromised computers.
  • Caesar cipher: 

    The earliest encryption method which Julius Caesar is said to have used to send coded messages to his generals in the field.
  • Call-back device: 

    Hardware component that asks the caller to enter a password and then breaks the connection to perform a security check.
  • Certification authority (CA): 

    A digital certificate that is issued by a trusted third party.
  • Compiler:
    Language translation modules of the operation system.
  • Data collision: 

    Two or more signals are transmitted simultaneously that destroy both messages.
  • Data encryption standard (DES): 

    An older encryption technique of Triple-DES encryption.
  • Deep packet inspection (DPI):

    An analytical and statistical techniques to evaluate the contents of message packets.
  • Denial of Service (DoS): 

    It is an assault on a Web server to prevent it from servicing its legitimate users.
  • Digest: 

    It is a mathematical value calculated from the text content of the message.
  • Digital certificate: 

    A process that proves the message received was not tampered with during transmission.
  • Digital envelope: 

    It is the usage of data encryption standard (DES) and Rivest-Shamir-Adleman (RSA).
  • Digital signature: 

    It is an electronic authentication that cannot be forged.
  • Discretionary access privileges: 

    A grant access privileges to other users
  • Distributed denial of service (DDoS): 

    A form of a SYN flood or smurf attack.
  • Echo check: 

    Technique that involves the receiver of the message returning the message to the sender.
  • EDE3: A key to encrypt the message.
  • Electronic data interchange (EDI):

    The intercompany exchange of computer-processible business information in standard format.
  • EEE3: Three different keys to encrypt the message three times.
  • Encryption: 

    Technique that uses a computer program to transform a standard message being transmitted into a coded (cipher text) form.
  • Event monitoring: 

    A key activity related to system resources.