Auditing: It involves reviewing records to ensure that nothing is out of the ordinary
Authentication: A crucial application for cryptographic hash functions
Authentication server (AS): It includes the user ID of the authenticating user
Authorization: It pertains to describing what the user account has access to or doesn't have access to
Availability:Means that the information we have is readily accessible to those people that should have it
B
Backdoor: A way to get into a system if the other methods to get in a system aren't allowed, it's a secret entryway for attackers
Baiting: An attack that happens through actual physical contact, enticing a victim to do something
Bastion hosts or networks: A server used to provide access to a private network from an external network
Binary whitelisting software:It's a list of known good and trusted software and only things that are on the list are permitted to run
Biometric authentication: Authentication that uses Biometric data
Bind: It is how clients authenticate to the server
Botnet: A collection of one or more Bots
Bots: Machines compromised by malware that are utilized to perform tasks centrally controlled by an attacker
Block ciphers:The cipher takes data in, places that into a bucket or block of data that's a fixed size, then encodes that entire block as one unit
Brute force attacks: A common password attack which consists of just continuously trying different combinations of characters and letters until one gets access
C
CA (Certificate authority): It's the entity that's responsible for storing, issuing, and signing certificates. It's a crucial component of the PKI system
Caesar cipher: A substitution alphabet, where you replace characters in the alphabet with others usually by shifting or rotating the alphabet, a set of numbers or characters