Terms and definitions from Course 5



Yüklə 126,95 Kb.
səhifə8/16
tarix19.12.2023
ölçüsü126,95 Kb.
#186217
1   ...   4   5   6   7   8   9   10   11   ...   16
zbJSBltbTgSqZI2cm2kgiw 8ceea7217478477aa50f1e277b9abef1 C5-Glossary

Key escrow: Allows encryption key to be securely stored for later retrieval by an authorized party
Key length: It defines the maximum potential strength of the system
Key signing parties: Organized by people who are interested in establishing a web of trust, and participants perform the same verification and signing
Key size: It is the total number of bits or data that comprises the encryption key
Keylogger: A common type of spyware that's used to record every keystroke you make
L
Lightweight Directory Access Protocol (LDAP): An open industry-standard protocol for accessing and maintaining directory services
Logic bomb: A type of Malware that's intentionally installed
Logs analysis systems: They are configured using user-defined rules to match interesting or atypical log entries
L2TP (Layer 2 Tunneling Protocol): It is typically used to support VPNs
M
MACs (Message Authentication Codes): A bit of information that allows authentication of a received message, ensuring that the message came from the alleged sender and not a third party masquerading as them
Malware: A type of malicious software that can be used to obtain your sensitive information or delete or modify files
MD5: A popular and widely used hash function designed in the early 1990s as a cryptographic hashing function
Meddler in the middle (formerly known as Man in the Middle): An attack that places the attacker in the middle of two hosts that think they're communicating directly with each other
MIC (Message Integrity Check): It is essentially a hash digest of the message in question
Monitor mode: It allows to scan across channels to see all wireless traffic being sent by APs and clients
Multifactor authentication (MFA): A system where users are authenticated by presenting multiple pieces of information or objects
N
Network hardening: Is the process of securing a network by reducing its potential vulnerabilities through configuration changes, and taking specific steps

Yüklə 126,95 Kb.

Dostları ilə paylaş:
1   ...   4   5   6   7   8   9   10   11   ...   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin