Terms and definitions from Course 5



Yüklə 126,95 Kb.
səhifə16/16
tarix19.12.2023
ölçüsü126,95 Kb.
#186217
1   ...   8   9   10   11   12   13   14   15   16
zbJSBltbTgSqZI2cm2kgiw 8ceea7217478477aa50f1e277b9abef1 C5-Glossary

Vendor risk review: Questionnaire that covers different aspects of their security policies procedures and defenses
Version: What version of the X.509 standard certificate adheres to
Viruses: The best known type of malware
VPN (Virtual Private Network): A secure method of connecting a device to a private network over the internet
VPNs: Commonly used to provide secure remote access, and link two networks securely
Vulnerability: A flaw in the system that could be exploited to compromise the system
Vulnerability scanner: Detect lots of things, ranging from misconfigured services that represent potential risks, to detecting the presence of back doors and systems

W
Web of trust: It is where individuals instead of certificate authorities sign other individuals' public keys


WEP (Wired Equivalent Privacy): First security protocol introduced for Wi-FI networks
Wireshark: It's another packet capture and analysis tool that you can use, but it's way more powerful when it comes to application and packet analysis, compared to tcpdump
Worms: They are similar to viruses except that instead of having to attach themselves onto something to spread, worms can live on their own and spread through channels like the network
WPA (Wi-fi protected access): Designed as a short-term replacement that would be compatible with older WEP-enabled hardware with a simple firmware update
WPA2 Enterprise: It's an 802.1x authentication to Wi-Fi networks
WPS (Wifi Protected Setup): It's a convenience feature designed to make it easier for clients to join a WPA-PSK protected network

X
X.509 standard: It is what defines the format of digital certificates, as well as a certificate revocation list or CRL


XTACACS: It stands for Extended TACACS, which was a Cisco proprietary extension on top of TACACS
Y
Z
0-Day Vulnerability (Zero Day): A vulnerability that is not known to the software developer or vendor, but is known to an attacker



Yüklə 126,95 Kb.

Dostları ilə paylaş:
1   ...   8   9   10   11   12   13   14   15   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin