Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [305]

By Root 3259 0
source to destination.

routing A function of the Network layer that involves moving data throughout a network. Data passes through several network subnetworks using routers that can select the path the data takes. See also router.

Routing Information Protocol (RIP) A distance-vector route discovery protocol used by Internetwork Packet Exchange (IPX) and Internet Protocol (IP). IPX uses hops and ticks to determine the cost for a particular route. See also Internetwork Packet Exchange (IPX).

routing table A table that contains information about the locations of other routers on the network and their distance from the current router.

RSA One of the providers of cryptography systems to industry and government. RSA stands for the initials of the three founders of RSA Security Inc.: Rivest, Shamir, and Adleman. RSA maintains a list of standards for Public Key Cryptography Standards (PKCS).

RSA A commercial company that produces encryption software. RSA stands for Rivest, Shamir, and Adleman, the founders of the company.

RSBAC See Rule Set-Based Access Control (RSBAC).

Rule Set-Based Access Control (RSBAC) An open-source access control framework for the Linux kernel that uses access control modules to implement Mandatory Access Control (MAC).

S

SAM See Security Accounts Manager (SAM).

sandbox A set of rules used when creating a Java applet that prevents certain functions when the applet is sent as part of a web page.

scanning The process that attackers use to gather information about how a network is configured.

screened host A router that is in front of a server on the private network. Typically, this server does packet filtering before reaching the firewall/proxy server that services the internal network.

secret key See private key.

Secure Electronic Transaction (SET) A protocol developed by Visa and MasterCard for secure credit card transactions. The protocol is becoming an accepted standard by many companies. SET provides encrypted credit card numbers over the Internet, and it’s most suited to small amounts of data transmission.

Secure Hash Algorithm (SHA) A one-way hash algorithm designed to ensure the integrity of a message.

Secure Hypertext Transfer Protocol (S-HTTP) A protocol used for secure communications between a web server and a web browser.

Secure Shell (SSH) A replacement for rlogin in Unix/Linux that includes security. rlogin allowed one host to establish a connection with another with no real security being employed; SSH replaces it with slogin and digital certificates.

Secure Sockets Layer (SSL) A protocol that secures messages by operating between the Application layer (HTTP) and the Transport layer.

Secure WLAN Protocol (SWP) A method of securing wireless networks that is beginning to gain momentum and acceptance.

Security Accounts Manager (SAM) A database within Windows NT-based operating systems that contains information about all users and groups and their associated rights and settings within a domain.

security audit An audit of the system (host, network, and so on) for security vulnerabilities and holes.

security log A log file used in Windows NT to keep track of security events specified by the domain’s audit policy.

security policies Rules set in place by a company to ensure the security of a network. These may include how often a password must be changed or how many characters a password should be.

security professionals Individuals who make their living working with computer security.

security token A piece of data that contains the rights and access privileges of the token bearer as part of the token.

security zone A method of isolating a system from other systems or networks.

segment A unit of data transmission found at the Transport layer of the Open Systems Interconnection (OSI) model and used by TCP.

sensor A device that collects data from the data source and passes it on to the analyzer.

separation of duties A set of policies designed to reduce the risk of fraud and prevent other losses in an organization.

sequence number A number used to determine the order

Return Main Page Previous Page Next Page

®Online Book Reader