Terms and definitions from Course 5


PBKDF2 (Password Based Key Derivation Function 2)



Yüklə 126,95 Kb.
səhifə10/16
tarix19.12.2023
ölçüsü126,95 Kb.
#186217
1   ...   6   7   8   9   10   11   12   13   ...   16
zbJSBltbTgSqZI2cm2kgiw 8ceea7217478477aa50f1e277b9abef1 C5-Glossary

PBKDF2 (Password Based Key Derivation Function 2): Password Based Key Derivation Function 2
PCI DSS: Payment Card Industry Data Security Standard
Penetration testing: The practice of attempting to break into a system or network to verify the systems in place
PGP (Pretty Good Privacy) encryption: An encryption application that allows authentication of data along with privacy from third parties relying upon asymmetric encryption to achieve this
Phishing attack: It usually occurs when a malicious email is sent to a victim disguised as something legitimate
Physical tokens: They take a few different forms, such as a USB device with a secret token on it, a standalone device which generates a token, or even a simple key used with a traditional lock
PIN authentication method: It uses PINs that are eight-digits long, but the last digit is a checksum that's computed from the first seven digits
Ping flood: It sends tons of ping packets to a system. If a computer can't keep up with this, then it's prone to being overwhelmed and taken down
PKI system: A system that defines the creation, storage and distribution of digital certificates
Platform key: It's the public key corresponding to the private key used to sign the boot files
Port mirroring: Allows the switch to take all packets from a specified port, port range, or the entire VLAN and mirror the packets to a specified switch port
Post-fail analysis
Pre-shared key: It's the Wi-Fi password you share with people when they come over and want to use your wireless network
Principle of least privilege: Helps to ensure that sensitive data is only accessed by people who are authorized to access it
Privacy policies: Oversees the access and use of sensitive data
Promiscuous mode: A type of computer networking operational mode in which all network data packets can be accessed and viewed by all network adapters operating in this mode

Yüklə 126,95 Kb.

Dostları ilə paylaş:
1   ...   6   7   8   9   10   11   12   13   ...   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin