Terms and definitions from Course 5



Yüklə 126,95 Kb.
səhifə7/16
tarix19.12.2023
ölçüsü126,95 Kb.
#186217
1   2   3   4   5   6   7   8   9   10   ...   16
zbJSBltbTgSqZI2cm2kgiw 8ceea7217478477aa50f1e277b9abef1 C5-Glossary

Host-based firewalls: Protects individual hosts from being compromised when they're used in untrusted and potentially malicious environments
HTTPS: It is the secure version of HTTP, the Hypertext Transfer Protocol
Hubs: Devices that serve as a central location through which data travels through; a quick and dirty way of getting packets mirrored to your capture interface
Identification: The idea of describing an entity uniquely
Impact: The impact of an incident is also an important issue to consider
Implicit deny: A network security concept where anything not explicitly permitted or allowed should be denied
Injection attacks: A common security exploit that can occur in software development and runs rampant on the web, where an attacker injects malicious code
Integrity: Means keeping our data accurate and untampered with
Intermediary (subordinate) CA: It means that the entity that this certificate was issued to can now sign other certificates
Intrusion detection and intrusion protection systems (IDS/IPS): Operates by monitoring network traffic and analyzing it
IPsec (Internet Protocol security): A VPN protocol that was designed in conjunction with IPv6
IP source guard (IPSG): It can be enabled on enterprise switches along with DHCP snooping
Issuer Name: This field contains information about the authority that signed the certificate
J

K
Kerberos: A network authentication protocol that uses tickets to allow entities to prove their identity over potentially insecure channels to provide mutual authentication


Kerckhoff's principle: A principle that states that a cryptosystem, or a collection of algorithms for key generation and encryption and decryption operations that comprise a cryptographic service should remain secure, even if everything about the system is known except for the key
Key: A crucial component of a cipher, which introduces something unique into your cipher

Yüklə 126,95 Kb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   10   ...   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin