Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [291]

By Root 3283 0
A virus that creates a new program that runs in place of an expected program of the same name.

compartmentalization Standards that support a nonhierarchical security classification.

confidentiality Assurance that data remains private and no one sees it except for those expected to see it.

configuration management The administration of setup and changes to configurations.

connectionless Type of communications between two hosts that have no previous session established for synchronizing sent data. The data isn’t acknowledged at the receiving end. This method can allow data loss. Within the TCP/IP suite, User Datagram Protocol (UDP) is used for connectionless communication.

connection-oriented Type of communications between two hosts that have a previous session established for synchronizing sent data. The receiving PC acknowledges the data. This method allows for guaranteed delivery of data between PCs. Within the TCP/IP suite, TCP is used for connection-oriented communications.

cookie A plain-text file stored on your machine that contains information about you (and your preferences) and is used by a database server.

CPS See Certificate Practice Statement (CPS).

cracker See hacker.

CRC See cyclical redundancy check (CRC).

critical business functions Functions on which the livelihood of the company depends.

CRL See Certificate Revocation List (CRL).

cryptanalysis The study and practice of finding weaknesses in ciphers.

cryptanalyst A person who does cryptanalysis.

cryptographer A person who participates in the study of cryptographic algorithms.

cryptographic algorithm A symmetric algorithm, also known as a cipher, used to encrypt and decrypt data.

cryptography The field of mathematics focused on encrypting and decrypting data.

custodian An individual responsible for maintaining the data, and the integrity of it, within their area.

cyclical redundancy check (CRC) An error-checking method in data communications that runs a formula against data before transmission. The sending station then appends the resultant value (called a checksum) to the data and sends it. The receiving station uses the same formula on the data. If the receiving station doesn’t get the same checksum result for the calculation, it considers the transmission invalid, rejects the frame, and asks for retransmission.

D

DAC See Discretionary Access Control (DAC).

data integrity A quality that provides a level of confidence that data won’t be jeopardized and will be kept secret.

Data Link layer The second layer of the Open Systems Interconnection (OSI) model. It describes the physical topology of a network.

data packet A unit of data sent over a network. A packet includes a header, addressing information, and the data itself.

data repository A centralized storage location for data, such as a database.

data source Where data originates.

datagram A Layer 3, User Datagram Protocol (UDP) packet descriptor.

DDoS attack See distributed denial of service (DDoS) attack.

decryption The process of converting encrypted data back into its original form.

default gateway The router to which all packets are sent when the workstation doesn’t know where the destination station is or when it can’t find the destination station on the local segment.

demilitarized zone (DMZ) An area for placing web and other servers that serve the general public outside the firewall, therefore, isolating them from internal network access.

denial of service (DoS) attack A type of attack that prevents any users—even legitimate ones—from using a system.

destination port number A portion of a complete address of a PC to which data is being sent from a sending PC. The port portion allows for the demultiplexing of data to be sent to a specific application.

detection The act of noticing an irregularity as it occurs.

DHCP See Dynamic Host Configuration Protocol (DHCP).

dictionary attack The act of attempting to crack passwords by testing them against a list of dictionary words. With today’s powerful computers, an attacker can combine one of many available automated

Return Main Page Previous Page Next Page

®Online Book Reader