Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [301]

By Root 3225 0
6, to install and manage printers. NDPS supports automatic network printer installation, automatic distribution of client printer drivers, and centralized printer management without the use of print queues.

NSA See National Security Agency (NSA).

O

offsite storage Storing data off site, usually in a secure location.

one-tier model A model in which the database and applications exist on the same system.

one-time pad Words added to values during authentication. The message to be encrypted is added to this random text before hashing.

onsite storage Storing backup data at the same site as the servers on which the original data resides.

Open Shortest Path First (OSPF) A link-state routing protocol used in IP networks.

Open Systems Interconnection (OSI) model A model defined by the ISO to categorize the process of communication between computers in terms of seven layers. The seven layers are Application, Presentation, Session, Transport, Network, Data Link, and Physical. See also International Organization for Standardization (ISO).

operational security Security as it relates to how an organization does things (operates).

operator The person primarily responsible for the intrusion detection system (IDS).

OS hardening The process of applying all security patches and fixes to an operating system to make it as secure as possible.

OSI model See Open Systems Interconnection (OSI) model.

OSPF See Open Shortest Path First (OSPF).

out-of-band method A way to transmit the encryption key by using a method other than the one used to transmit the data. The key value is sent by letter, by courier, or by some other separate means.

OVAL An acronym for Open Vulnerability and Assessment Language, it is a community standard for system analysis that focuses on testing, analyzing, and reporting.

owner The person responsible for the current existence of a resource.

P

packet filtering A firewall technology that accepts or rejects packets based on their content.

packet switching The process of breaking messages into packets at the sending router for easier transmission over a WAN.

pad A number of characters often added to data before an operation such as hashing takes place. Most often unique values, known as one-time pads, are added to make the resulting hash unique.

PAP See Password Authentication Protocol (PAP).

partitioning The process of breaking a network into smaller components that can be individually protected.

passive detection A type of intruder detection that logs all network events to a file for an administrator to view later.

passive response A nonactive response, such as logging. Passive response is the most common type of response to many intrusions. In general, passive responses are the easiest to develop and implement.

Password Authentication Protocol (PAP) One of the simplest forms of authentication. Authentication is accomplished by sending the username and password to the server and having them verified. Passwords are sent as clear text and, therefore, can be easily seen if intercepted.

password guessing Attempting to enter a password by guessing its value.

password history A list of passwords that have already been used.

PAT See Port Address Translation (PAT).

patch A fix for a known software problem.

penetration The act of gaining access.

perimeter security Security set up on the outside of the network or server to protect it.

PGP See Pretty Good Privacy (PGP).

phage virus A virus that modifies and alters other programs and databases.

phishing A form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. Commonly sent via e-mail.

phreaker Someone who abuses phone systems, as opposed to data systems.

physical access control Control access measures used to restrict physical access to the server(s).

physical barrier An object, such as a locked door, used to restrict physical access to network components.

Physical layer The first layer of the OSI model; controls the functional interface.

Return Main Page Previous Page Next Page

®Online Book Reader