Terms and definitions from Course 5



Yüklə 126,95 Kb.
səhifə1/16
tarix19.12.2023
ölçüsü126,95 Kb.
#186217
  1   2   3   4   5   6   7   8   9   ...   16
zbJSBltbTgSqZI2cm2kgiw 8ceea7217478477aa50f1e277b9abef1 C5-Glossary


Glossary
IT Support


Terms and definitions from Course 5


#
802.1X: It is the IEEE standard for encapsulating EAP or Extensible Authentication Protocol traffic over the 802 networks
802.1X with EAP-TLS: Offers arguably the best security available, assuming proper and secure handling of the PKI aspects of it
A
Access Control Entries: The individual access permissions per object that make up the ACL
Access Control List (ACL): It is a way of defining permissions or authorizations for objects
Accounting: Keeping records of what resources and services your users access or what they did when they were using your systems
Activation threshold: Triggers a pre-configured action when it is reached and will typically block the identified attack traffic for a specific amount of time
Advanced Encryption Standard (AES): The first and only public cipher that's approved for use with top secret information by the United States National Security Agency
Adware: Software that displays advertisements and collects data
Analyzing logs: The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them
Antivirus software: It monitors and analyze things like new files being created or being modified on the system in order to watch for any behavior that matches a known malware signature
Application policies: Defines boundaries of what applications are permitted or not, but they also help educate folks on how to use software more securely
Asymmetric encryption: Systems where different keys are used to encrypt and decrypt
Attack: An actual attempt at causing harm to a system
Attack surface: It's the sum of all the different attack vectors in a given system
Attack vector: Method or mechanism by which an attacker or malware gains access to a network or system

Yüklə 126,95 Kb.

Dostları ilə paylaş:
  1   2   3   4   5   6   7   8   9   ...   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin