Terms and definitions from Course 5


Exploit: Software that is used to take advantage of a security bug or vulnerability Extensible authentication protocol (EAP over LAN, or EAPOL)



Yüklə 126,95 Kb.
səhifə6/16
tarix19.12.2023
ölçüsü126,95 Kb.
#186217
1   2   3   4   5   6   7   8   9   ...   16
zbJSBltbTgSqZI2cm2kgiw 8ceea7217478477aa50f1e277b9abef1 C5-Glossary

Exploit: Software that is used to take advantage of a security bug or vulnerability
Extensible authentication protocol (EAP over LAN, or EAPOL): A standard authentication protocol
F
Fail to ban: A common open source flood guard protection tool
File-based encryption: Guarantees confidentiality and integrity of files protected by encryption
FIPS (Federal Information Processing Standard): The DES that was adopted as a federal standard for encrypting and securing government data
Flood guards: Provide protection against DoS or Denial of Service Attacks
Forward secrecy: This is a property of a cryptographic system so that even in the event that the private key is compromised, the session keys are still safe
Four-Way Handshake: It is designed to allow an AP to confirm that the client has the correct pairwise master key in a WPA-PSK setup without disclosing the PMK
Frequency analysis: The practice of studying the frequency with which letters appear in ciphertext
Full disk encryption (FDE): It is the practice of encrypting the entire drive in the system
G
GTK (Groupwise Transient Key): A temporal key, which is actually used to encrypt data
H
Hacker: Someone who attempts to break into or exploit a system
Half-open attacks: A way to refer to SYN floods
Hash collisions: Two different inputs mapping to the same output
Hashing (Hash function): A type of function or operation that takes in an arbitrary data input and maps it to an output of a fixed size, called a hash or a digest
High value data: usually includes account information, like usernames and passwords. Typically, any kind of user data is considered high value, especially if payment processing is involved
HMAC (Keyed-Hash Message Authentication Codes): It uses a cryptographic hash function along with a secret key to generate a MAC

Yüklə 126,95 Kb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   ...   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin