CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [307]
single sign-on (SSO) A relationship between the client and the network wherein the client is allowed to log on one time, and all resource access is based on that logon (as opposed to needing to log on to each individual server to access the resources there).
site survey A generic site survey involves listening in on an existing wireless network using commercially available technologies. A wireless site survey, or wireless survey, is the process of planning and designing a wireless network, in particular an 802.11.
SLIP See Serial Line Internet Protocol (SLIP).
SMTP See Simple Mail Transfer Protocol (SMTP).
SMTP relay A feature designed into many e-mail servers that allows them to forward e-mail to other e-mail servers. While the ability to act as a relay exists to allow networks to grow, the possibility exists for rogue servers to also participate.
smurf attack An attack in which large volumes of ICMP echo requests (pings) are broadcast to all other machines on the network and in which the source address of the broadcast system has been spoofed to appear as though it came from the target computer. When all the machines that received the broadcast respond, they flood the target with more data than it can handle.
snapshot backup A method of performing backups that creates a compressed file of a database as it exists at the moment, without taking the users offline. A snapshot backup can take the place of other backups. It’s often run on mirrored servers, but the snapshot captures only the most recent version of files.
sniffer A physical device that listens in (sniffs) on network traffic and looks for items it can make sense of. There is a legitimate purpose for these devices: Administrators use them to analyze traffic. However, when they’re used by sources other than the administrator, they become security risks.
sniffing Analyzing data to look for passwords and anything else of value. Sniffing is also known as wiretapping, eavesdropping, and a number of other terms (packet sniffing, network sniffing, and so on).
SNMP See Simple Network Management Protocol (SNMP).
snooping Looking through files in hopes of finding something interesting.
social engineering An attack that uses others by deceiving them.
socket The primary method used to communicate with services and applications such as the Web and Telnet. The socket is a programming construct that enables communication by mapping between ports and addresses.
software exploitation An attack launched against applications and higher-level services.
spam Unwanted, unsolicited e-mail sent in bulk.
spike A momentary or instantaneous increase in power over a power line.
spoofing attack An attempt by someone or something to masquerade as someone else.
SPX See Sequenced Packet Exchange (SPX).
spyware Software programs that work—often actively—on behalf of a third party.
SSH See Secure Shell (SSH).
SSL See Secure Sockets Layer (SSL).
state table A firewall security method that monitors the status of all the connections through the firewall.
stateful packet filtering Inspections that occur at all levels of the network and provide additional security using a state table that tracks every communications channel.
static Address Resolution Protocol (ARP) table entry An entry in the Address Resolution Protocol (ARP) table that a user adds manually when a PC will be accessed often.
static routing A method of routing packets where the router’s routing table is updated manually by the network administrator instead of automatically by a route discovery protocol.
stealth port A port that is open but might not be obvious (invisible to those who don’t know it exists). Trojan horses often exploit them.
stealth virus A virus that attempts to avoid detection by masking itself from applications.
steganography The science of hiding information within other information, such as a picture.
strength The effectiveness of a cryptographic system in preventing unauthorized decryption.
subscriber An individual