-
802.1x
A wireless security standard method for authenticating users.
-
Account lockout policies
Policies controlling account lockout configuration parameters.
-
Active Directory Users and Computers
A Windows Active Directory utility used to manage organizational units, users, groups, computers, and other domain objects.
-
AES
Advanced Encryption Standard (AES) A symmetric-key encryption standard adopted by the U.S. government using three block ciphers, each of which consists of a 128-bit block size.
-
Adware
Software that makes a computer more easily locatable by and more susceptible to pop-up and other online ads.
-
Asymmetric keys
The public and private keys used in public key encryption.
-
Authentication credentials
Information or a security device used to authenticate a user’s access to a network, most commonly based on user name and password.
-
Authenticator
A term that refers to a WAP during 802.1x authentication.
-
Availability
A term that refers to providing continuous operation of an organization’s hardware and software so that there is no interruption of service.
-
Biometric scan
A security scan based on a user’s identifiable physical characteristic.
-
Bit strength
A measure of encryption strength based on the number of bits in a key.
-
Business continuity planning
Ensuring availability and integrity; keeping the business running when disruptions occur.
-
Confidentiality
A term that refers to protection of organization data from unauthorized disclosure.
-
DES
Data Encryption Standard (DES) A private key encryption system originally developed by IBM.
-
DDoS agent
Software placed on a computer that enables it to be used as a message source in a DDoS attack.
-
DDoS handler
Software used during a DDoS attack to control the agents.
-
DMZ
Demilitarized zone (DMZ) A protected area of a network between the internal network and the Internet that is bounded by one or two firewalls. Also known as a perimeter network.
-
DoS
Denial of service (DoS) An attack that attempts to disrupt a network or its servers by flooding them with packets.
-
Disruption
Interruptions of or reductions in network service.
-
DDoS
Distributed denial of service (DDoS) attack A DoS attack in which the attacker controls multiple attacking systems.
-
Domain account
A Windows Active Directory user account used for domain authentication and resource access authorization.
-
Encryption algorithm
Values used for data encryption. Also known as an encryption formula.
-
Encryption key
The table or formula that defines which character in the data translates to which encoded character.
-
Firewall
A network security device that filters traffic into and out of a network or subnet.
-
Hacker
An expert in problem solving with a computer who sometimes gains illegal access to and sometimes tampers with information in a computer system.
-
Integrity
The assurance that data has not been altered or destroyed.
-
ICMP
Internet Control Message Protocol (ICMP) A management and troubleshooting protocol that provides support through error and control messages.
-
IPSec
Internet Protocol Security (IPSec) A security protocol used for VPN security.
-
IP spoofing
The process of sending packets with a fake source address.
-
L2TP
Layer 2 Tunneling Protocol (L2TP) A security protocol used for VPN security.
-
Local account
A user account used by a local computer for authorization and resource access authentication.
-
Malware
Malicious or annoying unwanted software.
-
Mission-critical application
An information system that is vital to an organization.
-
Perimeter network
See demilitarized zone (DMZ).
-
Ping of Death
A type of DoS attack that sends oversized ping packets to the target computer.
-
Polymorphic virus
A type of encrypted virus that includes a scrambled virus body, a decryption routine that first gains control of the computer, and a mutation engine randomizing decryption routines that change each time a virus infects a new program.
-
Private key
An encryption key known to the receiver only in public key encryption.
-
Public key
An encryption key used by the sender to encrypt data and based on the receiver’s private key.
-
Public key encryption
Encryption based on separate sender and receiver keys.
-
RSA
Rivest, Shamir, and Adleman (RSA) A public key encryption algorithm.
-
Rootkit
A program that can hide itself, along with other programs, files, and processes, from the operating system, antivirus software, and other security software.
-
Screened subnet
A subnet that is isolated from the rest of the network by a firewall.
-
Shared key encryption
Encryption based on a single key used for both encryption and decryption.
-
Smart card
Sometimes called an integrated circuit card (ICC), it is any pocket-sized plastic card with embedded integrated circuits, usually containing security information such as encryption keys to facilitate access control mechanisms.
-
Spyware
Software that monitors, records, and sometimes sends out computer activity, usually without the user’s knowledge.
-
Symmetric key encryption
Encryption based on a single key used for both encryption and decryption.
-
TKIP
Temporal Key Integrity Protocol (TKIP) An encryption algorithm that is used to encrypt keys used with WPA.
-
Trojan horse (Trojan)
A program that is expected to do one thing but actually does something else. The name is a reference to classical Greek literature.
-
WPA
Wi-Fi Protected Access (WPA) A wireless security standard that uses TKIP and user authentication.
-
WEP
Wired Equivalent Privacy (WEP) A security scheme that can provide basic security for 802.11b and 802.11g networks.
-
Worm
A self-propagating form of malicious software.
-
Active Directory Users and Computers
A Windows Active Directory utility used to manage organizational units, users, groups, computers, and other domain objects.
-
Alert
A response to a Windows performance threshold value being met or exceeded.
-
Automated software delivery
See electronic software distribution.
-
Automatic failover
A failover process in which an error is detected automatically, and the configuration switches over to the redundant server without administrator intervention.
-
Backup
The process of copying data stored on a computer and saving an exact duplicate of the data on another storage device.
-
Baselining
The process of collecting performance baseline information.
-
Bottlenecks
Network or computer components responsible for loss of performance.
-
CMIP
Common Management Information Protocol (CMIP) A management protocol developed in response to and as an alternative to SNMP.
-
Disk duplexing
A RAID 1 configuration based on two hard disks being connected to different disk controllers.
-
Disk mirroring
A RAID 1 configuration based on two hard disks being connected to the same disk controller.
-
Disk striping with parity
See RAID 5.
-
ESD
Electronic software distribution (ESD) A process by which software and updates are distributed automatically to network computers. Also known as automated software delivery and sometimes desktop management.
-
EtherPeek
A network monitoring application.
-
Failover
The process of switching over to a redundant computer.
-
Fault
A term that refers to the error reported when data cannot be found in memory.
-
Fault tolerance
The ability of equipment or network resources to continue operating even after a failure.
-
Full backup
Another term for normal backup.
-
Hot redundancy
A redundant configuration with duplicate hardware, software, and data, in which the data is kept in sync with the primary server to allow for immediate failover.
-
Hot-swappable
A device that can be replaced without powering off.
-
Latency Network performance delays.
-
Manual failover
A failover process that requires administrator or operating intervention, typically because it is necessary to synchronize the data on the redundant server.
-
Network administrator
An individual who is responsible for network management and support.
-
Network management
The process of operating, monitoring, and controlling a network to ensure that it works as intended and provides value to its users.
-
Normal backup
A backup operation that backs up all specified data and resets the archive bit as each file is backed up. Also known as a full backup.
-
Performance baseline
Performance information used as a point of comparison for network and computer performance analysis. It often includes both typical and peak performance values.
-
Promiscuous mode
A mode of operation that allows a network adapter to intercept and read the complete contents of any packet on a network.
-
RAID 1
A fault-tolerant configuration based on two hard disk drives, with both containing the same data. Data is protected in the event of the failure of a single hard disk. See also disk mirroring and disk duplexing.
-
RAID 5
A fault-tolerant configuration based on three or more hard disks in which data and parity information are striped across the hard disks. Data is protected in the event of the failure of any one hard disk. Also known as disk striping with parity.
-
Redundancy
1.Duplicate data paths. 2. Duplication of resources.
-
RAID
Redundant array of independent (or inexpensive) disks (RAID) A disk configuration that provides improved disk performance, disk fault tolerance, or both.
-
Redundant systems
Systems that duplicate resources provided by primary network systems.
-
SNMP
Simple Network Management Protocol (SNMP) A TCP/IP protocol for remote configuration, monitoring, and management.
-
Warm redundancy
A redundant configuration with duplicate hardware and software but where data on the redundant hardware is not kept in sync with the primary server.
|
|