F-O

Cards (20)

  • Firewall
    : Software and hardware that provide a focal point for security by channeling all network connections through a control gateway.
  • Hierarchical topology
    : Topology where a host computer is connected to several levels of subordinate smaller computers in a master-slave relationship.
  • Internet relay chat (IRC): It is a source of zombies.
  • Interpreter
    : Language translation modules of the operating system that convert one line of logic at a time.
  • Intranets
    : Consist of small LANs and large wide area networks (WANs) that may contain thousands of individual nodes.
  • Intrusion prevention systems (IPS)

    : A system that employ deep packet inspection (DPI) to determine when an attack is in progress.
  • IP broadcast address:

    A message that sent to entire subsub-networknetwork of computers.
  • IP spoofing
    It is a form of masquerading to gain unauthorized access to a Web server and/or to perpetrate an unlawful act without revealing one’s identity.
  • Key: A is a mathematical value that the sender selects.
  • Keystroke monitoring
    : It involves recording both the user’s keystrokes and the system’s responses.
  • Line error

    : A problem in data communications and data loss.
  • Log-on procedure
    : It is the operating system’s first line of defense against unauthorized access.
  • Message sequence numbering
    : A sequence number that is inserted in each message, and any such attempt will become apparent at the receiving end.
  • Message transaction log
    : The log that records all incoming and outgoing messages.
  • Multilevel password control
    : It involves sharing the same computers to specific directories, programs, and data files.
  • Network-level firewall
    : Firewalls that provide efficient but low-security access control.
  • Network topology
    : Physical arrangement of the components.
  • One-time passwords
    : A password control approach that uses the technology that employs a credit card-sized smart card containing a microprocessor programmed with an algorithm that generates, and electronically displays, a new and unique password every 60 seconds.
  • Operating system security
    : It involves policies, procedures, and controls that determine who can access the operating system, which resources (files, programs, printers, etc.) they can use, and what actions they can take.
  • Operating system
    : It is the computer’s control program that allows users and their applications to share and access common computer resources, such as processors, main memory, databases, and printers.