OS Security Vocabulary

Beschreibung

Terms related to OS security.
Shantal K  Green
Karteikarten von Shantal K Green, aktualisiert more than 1 year ago
Shantal K  Green
Erstellt von Shantal K Green vor mehr als 4 Jahre
9
0

Zusammenfassung der Ressource

Frage Antworten
Honeypot a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.
Perimeter Networks -the network closest to a router that is not under your control. -the final step a packet takes traversing one of your networks on its way to the internet; and conversely the first network encountered by incoming traffic from the Internet.
NAT Network Address Translation translates the IP addresses of computers in a local network to a single IP address. This address is often used by the router that connects the computers to the Internet
VPN a network that is constructed using public wires — usually the internet — to connect remote users or regional offices to a company's private, internal network.
IPsec Internet Protocol Security is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).
Server Isolation a policy design where you assign servers to a zone that allows access only to users and devices that authenticate as members of an approved network access group (NAG)
domain isolation a policy design where you configure the computers on your network to accept only connections coming from computers that are authenticated as members of the same isolated domain. This design typically begins with a network configured as described in the Basic Firewall Policy Design section.
Protocol Security A sequence of operations that ensure protection of data. Used with a communications protocol, it provides secure delivery of data between two parties. The term generally refers to a suite of components that work in tandem
Protocol Spoofing used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.
Tunneling a communications protocol that allows for the movement of data from one network to another. It involves allowing private network communications to be sent across a public network (such as the Internet) through a process called encapsulation.
encapsulation one of the fundamentals of OOP (object-oriented programming). It refers to the bundling of data with the methods that operate on that data.
DNSsec Domain Name System Security Extensions a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System (DNS) as used on Internet Protocol (IP) networks.
Network sniffing monitors or sniffs the data flowing over computer network links in real time
DOS Denial of Service a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Common Technology Terms
Julio Aldine Branch-HCPL
Project Communications Management
farzanajeffri
Network Protocols
Shannon Anderson-Rush
Abstraction
Shannon Anderson-Rush
Computing
Kwame Oteng-Adusei
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Historical Development of Computer Languages
Shannon Anderson-Rush
Useful String Methods
Shannon Anderson-Rush
Web Designing & Development Full Tutorial
Nandkishor Dhekane