Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [295]

By Root 3059 0
usually an operating system, more secure by closing known holes and addressing known security issues. hash/hashing The process of transforming characters into other characters that represent (but are not) the originals. Traditionally, the results are smaller and more secure than the original. hash value A single number used to represent an original piece of data.

Health Insurance Portability and Accountability Act (HIPAA) An act that addresses security and privacy of health-related data.

H-IDS See host-based IDS (H-IDS).

high availability A clustering solution to provide resource reliability and availability.

hijacking (TCP/IP hijacking) See man-in-the-middle attack.

HIPAA See Health Insurance Portability and Accountability Act (HIPAA).

HIPS See host-based IPS (H-IPS).

hoax Typically an e-mail message warning of something that isn’t true, such as the outbreak of a new virus. The hoax can send users into a panic and cause more harm than the virus.

honeypot (also known as Honey pot) A bogus system set up to attract and slow down a hacker. A honeypot can also be used to learn of the hacking techniques and methods that hackers employ.

host Any network device with a TCP/IP network address.

host-based IDS (H-IDS) An intrusion detection system that is host based. The alternative is network based.

host-based IPS (H-IPS) An intrusion prevention system that is host based. To prevent the intrusion, it must first detect it (thus making it a superset of H-IDS) and then act accordingly.

hostile code Any code that behaves in a way other than in the best interest of the user and the security of data.

host-to-host Describes communication that occurs between hosts.

hot fix/hotfix Another word for a patch. When Microsoft rolls a bunch of hotfixes together, they become known as a service pack.

hot site A location that can provide operations within hours of a failure.

HTML See Hypertext Markup Language (HTML).

HTTP See Hypertext Transfer Protocol (HTTP).

HTTPS See Hypertext Transfer Protocol (Secure).

HVAC A common acronym used for heating, ventilation, and air conditioning.

Hypertext Markup Language (HTML) A set of codes used to format text and graphics that will be displayed in a browser. The codes define how data will be displayed.

Hypertext Transfer Protocol (HTTP) The protocol used for communication between a web server and a web browser.

Hypertext Transfer Protocol (Secure) Also known as HTTPS. A combination of HTTP with Secure Sockets Layer (SSL) to make for a secure connection. It uses port 443 by default.

I

IAB See Internet Architecture Board (IAB).

IANA See Internet Assigned Numbers Authority (IANA).

ICMP See Internet Control Message Protocol (ICMP).

ICMP attack An attack that occurs by triggering a response from the Internet Control Message Protocol (ICMP) when it responds to a seemingly legitimate maintenance request. See also Internet Control Message Protocol (ICMP).

identification and authentication (I&A) A two-step process of identifying a person (usually when they log on) and authenticating them by challenging their claim to access a resource.

IDS See intrusion detection system (IDS).

IEEE See Institute of Electrical and Electronics Engineers, Inc. (IEEE).

IEEE 802.10 LAN/MAN Security A series of guidelines dealing with various aspects of network security.

IEEE 802.11 A family of protocols that provides for wireless communications using radiofrequency transmissions.

IEEE 802.11 Wireless LAN Defines the standards for implementing wireless technologies such as infrared and spread-spectrum radio.

IETF See Internet Engineering Task Force (IETF).

IGMP See Internet Group Management Protocol (IGMP). illicit server An application/program that shouldn’t be there but is operating on the network, and one that is commonly used to gain unauthorized control by allowing someone to bypass normal authentication. NetBus is one of the best-known examples of an illicit server.

IM See instant messaging (IM).

IMAP See Internet Message Access Protocol (IMAP).

incident An attempt to violate a security policy,

Return Main Page Previous Page Next Page

®Online Book Reader