Terms and definitions from Course 5


Proxy: Can be useful to protect client devices and their traffic. They also provide secure remote access without using a VPN Pseudo-random



Yüklə 126,95 Kb.
səhifə11/16
tarix19.12.2023
ölçüsü126,95 Kb.
#186217
1   ...   8   9   10   11   12   13   14   15   16
zbJSBltbTgSqZI2cm2kgiw 8ceea7217478477aa50f1e277b9abef1 C5-Glossary

Proxy: Can be useful to protect client devices and their traffic. They also provide secure remote access without using a VPN
Pseudo-random: Something that isn't truly random
Public key authentication: A key pair is generated by the user who wants to authenticate
Public key signatures: Digital signature generated by composing the message and combining it with the private key
Q
R
RA (Registration Authority): It is responsible for verifying the identities of any entities requesting certificates to be signed and stored with the CA
Rainbow table attacks: To trade computational power for disk space by pre-computing the hashes and storing them in a table
Rainbow tables: A pre-computed table of all possible password values and their corresponding hashes
Random numbers: A very important concept in encryption because it avoids some kind of pattern that an adversary can discover through close observation and analysis of encrypted messages over time
Ransomware: A type of attack that holds your data or system hostage until you pay some sort of ransom
RC4 (Rivest Cipher 4): Asymmetric stream cipher that gained widespread adoption because of its simplicity and speed
Recoverability: How complicated and time-consuming the recovery effort will be
Remote attestation: The idea of a system authenticating its software and hardware configuration to a remote system
Remote Authentication Dial-in User Service (RADIUS): A protocol that provides AAA services for users on a network
Reverse proxy: A service that might appear to be a single server to external clients, but actually represents many servers living behind it
Risk: The possibility of suffering a loss in the event of an attack on the system


Risk mitigation: Understanding the risks your systems face, take measures to reduce those risks, and monitor them



Yüklə 126,95 Kb.

Dostları ilə paylaş:
1   ...   8   9   10   11   12   13   14   15   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin