Exploit: Software that is used to take advantage of a security bug or vulnerability
Extensible authentication protocol (EAP over LAN, or EAPOL): A standard authentication protocol
F
Fail to ban: A common open source flood guard protection tool
File-based encryption: Guarantees confidentiality and integrity of files protected by encryption
FIPS (Federal Information Processing Standard):The DES that was adopted as a federal standard for encrypting and securing government data
Flood guards: Provide protection against DoS or Denial of Service Attacks
Forward secrecy: This is a property of a cryptographic system so that even in the event that the private key is compromised, the session keys are still safe
Four-Way Handshake: It is designed to allow an AP to confirm that the client has the correct pairwise master key in a WPA-PSK setup without disclosing the PMK
Frequency analysis:The practice of studying the frequency with which letters appear in ciphertext
Full disk encryption (FDE): It is the practice of encrypting the entire drive in the system
G
GTK (Groupwise Transient Key):A temporal key, which is actually used to encrypt data
H
Hacker: Someone who attempts to break into or exploit a system
Half-open attacks:A way to refer to SYN floods
Hash collisions: Two different inputs mapping to the same output
Hashing (Hash function): A type of function or operation that takes in an arbitrary data input and maps it to an output of a fixed size, called a hash or a digest
High value data:usually includes account information, like usernames and passwords. Typically, any kind of user data is considered high value, especially if payment processing is involved
HMAC (Keyed-Hash Message Authentication Codes): It uses a cryptographic hash function along with a secret key to generate a MAC