Terms and definitions from Course 5


Rogue Access Point (AP) Attack



Yüklə 126,95 Kb.
səhifə12/16
tarix19.12.2023
ölçüsü126,95 Kb.
#186217
1   ...   8   9   10   11   12   13   14   15   16
zbJSBltbTgSqZI2cm2kgiw 8ceea7217478477aa50f1e277b9abef1 C5-Glossary

Rogue Access Point (AP) Attack: An access point that is installed on the network without the network administrator's knowledge


Rogue DHCP server attack: An attacker can hand out DHCP leases with whatever information they want by deploying a rogue DHCP server on your network, setting a gateway address or DNS server, that's actually a machine within their control


Root certificate authority: They are self signed because they are the start of the chain of trust, so there's no higher authority that can sign on their behalf


Rootkit: A collection of software or tools that an admin would use


RSA: One of the first practical asymmetric cryptography systems to be developed, named for the initials of the three co-inventors: Ron Rivest, Adi Shamir and Leonard Adleman
S
Screen lock: A security feature that helps prevent unwanted access by creating an action you have to do to gain entry
Secure boot protocol: It uses public key cryptography to secure the encrypted elements of the boot process
Secure channel: It is provided by IPsec, which provides confidentiality, integrity, and authentication of data being passed
Secure element: It's a tamper resistant chip often embedded in the microprocessor or integrated into the mainboard of a mobile device
Secure Shell (SSH): A secure network protocol that uses encryption to allow access to a network service over unsecured networks
Security: It's all about determining risks or exposure understanding the likelihood of attacks; and designing defenses around these risks to minimize the impact of an attack
Security information and event management systems (SIEMS): Form of centralized logging for security administration purposes
Security keys: Small embedded cryptoprocessors, that have secure storage of asymmetric keys and additional slots to run embedded code

Yüklə 126,95 Kb.

Dostları ilə paylaş:
1   ...   8   9   10   11   12   13   14   15   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin