Home
Flashcards
Preview
Security+ 2008_B.csv
Home
Get App
Take Quiz
Create
ACL CIA FBI MMC CPU are all examples of
Acronyms
ACLs
Access Control Lists
DAC MAC RBAC RBAC* are examples of
Models of Access
DAC (model of access)
Discretionary Access Control
MAC (model of access)
Mandatory Access Control
RBAC (model of access)
Role-based Access Control
RBAC* (model of access)
Rule-based Access Control
Protection =
Prevention + (Detection + Response)
CIA of security stands for
Confidentiality Integrity Availability
What is the essence of implementing MAC?
Labels (i.e. TOP SECURIY clearance)
"What is the principle of ""implicit deny""?"
In a series of rules; one of them must allow access. if none does= NO ACCESS
3DES
Triple Digital Encryption Standard
AES
Advanced Encryption Standard
AES 256
Advanced Encryption Standard 256-bit
AH
Authentication Header
ALE
Annualized Loss Expectancy
ARO (camaro has annual checks of the rate of Occurrent problems)
Annualized Rate of Occurrence
ARP (old people with problems w addresses = address resolution Protocol)
Address Resolution Protocol
AUP
Acceptable Use Policy
BIOS
Basic Input / Output System
BOTS
Network Robots
CA (california authority)
Certificate Authority
CAN (canada has a controller of and area with Networds)
Controller Area Network
CCTV
Closed-Circuit TeleVision
CHAP (challenge to handshake to authenticate himself - protocol)
Challenge Handshake Authentication Protocol
CRL (certification of renovations in a list)
Certification Renovation List
DDOS
Distributed Denial Of Service
DES
Digital Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DLL
Dynamic Link Library
DMZ
Demilitarized Zone
DNS
Domain Name Service (server)
DOS
Denial Of Service (security wise)
Author
Anonymous
ID
27145
Card Set
Security+ 2008_B.csv
Description
t
Updated
2010-07-17T21:08:59Z
Home
Flashcards
Preview