CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [310]
user-level security A type of network security in which user accounts can read, write, change, and take ownership of files. Rights are assigned to user accounts, and each user knows only their own username and password—which makes this the preferred method for securing files.
user management policies Defined policies that detail user management.
V
virtual LAN (VLAN) Local area network (LAN) that allows users on different switch ports to participate in their own network separate from, but still connected to, the other stations on the same or a connected switch.
virtual link A link created by using a switch to limit network traffic.
virtual private network (VPN) System that uses the public Internet as a backbone for a private interconnection (network) between locations.
virus A program intended to damage a computer system. Sophisticated viruses are encrypted and hide in a computer, and might not appear until the user performs a certain action or until a certain date. See also antivirus.
volume The loudness of a sound, or the portion of a hard disk that functions as if it were a separate hard disk.
VPN See virtual private network (VPN).
W
WAN See wide area network (WAN).
war driving Driving around with a laptop looking for open wireless access points with which to communicate.
warm site A site that provides some capabilities in the event of a disaster. The organization that wants to use a warm site will need to install, configure, and reestablish operations on systems that might already exist in the warm site.
weak key A cipher hole that can be exploited.
weak key attack An attack that looks for cipher holes.
web proxy A type of proxy that is used to act on behalf of a web client or web server.
web server A server that holds and delivers web pages and other web content using HTTP. See also Hypertext Transfer Protocol (HTTP).
WEP See Wired Equivalent Privacy (WEP).
wide area network (WAN) A network that crosses local, regional, and/or international boundaries.
Wi-Fi See Wireless Fidelity (Wi-Fi).
Windows Internet Naming Service (WINS) A Network Basic Input Output System (NetBIOS) name resolution service employed in Windows networks. Windows Internet Naming Service (WINS) translates hostnames into network addresses.
Windows NT service A type of Windows program (a file with either an .exe or a .dll filename extension) that is loaded automatically by the server or manually by the administrator.
Windows socket A Microsoft API used to interact with TCP/IP.
WinNuke A Windows-based attack that affects only computers running Windows NT 3.51 or 4. It’s caused by the way the Windows NT TCP/IP stack handles bad data in the TCP header. Instead of returning an error code or rejecting the bad data, it sends NT to the Blue Screen of Death (BSOD). Figuratively speaking, the attack “nukes” the computer.
Wired Equivalent Privacy (WEP) A security protocol for 802.11b (wireless) networks that attempts to establish the same security for them as would be present in a wired network.
wireless access point A wireless bridge used in a multipoint radio frequency (RF) network.
wireless bridge A bridge that performs all the functions of a regular bridge but uses RF instead of cables to transmit signals.
Wireless Fidelity (Wi-Fi) An 802.11b or 802.11g wireless network operating in the 2.4Ghz or 5Hhz frequency range.
wireless local area network (WLAN) A local area network that employs wireless access points (WAPs) and clients using the 802.11 standards.
wireless portal The primary method of connecting a wireless device to a network.
wireless technologies Technologies employing wireless communications.
Wireless Transport Layer Security (WTLS) The security layer of the Wireless Applications Protocol (WAP). WTLS provides authentication, encryption, and data integrity for wireless devices.
WLAN See wireless local area network (WLAN).
work factor An estimate of the amount of time and effort that would be needed to break a system.
workgroup A specific group of users or network