CIW-NTA Lesson 6 Vocabulary
Across
- 3. INCLUDE THE PERIOD. The standard used by certificate authorities (CAs) for creating digital certificates.
- 5. To pursue stealthily, harass and/or prey upon another person using online venues such as chat rooms, email, social networking sites, etc. The stalker may also meet the victim in an online venue and may gain his or her trust before perpetrating harassment activities.
- 12. A legitimate practice in which a user account is automatically disabled after a certain number of failed authentication attempts.
- 13. A program specifically written to break into a password-protected system. It has a relatively large list of common password names that it repeatedly uses to gain access.
- 15. The process of managing a BYOD network using various tools.
- 16. A malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.
- 18. Willful harm inflicted on others through the use of information and communication technologies.
- 21. A method of intercepting the transmission of a password during the authentication process. A sniffer is a program used to intercept passwords.
- 23. A proprietary key-management scheme between unknown principals who want to communicate securely. Uses symmetric algorithms and acts as a trusted third party that knows the identities of the organizations asking to communicate, but does not reveal them.
- 25. Abbreviation for malicious software. Malware is software designed to harm computer systems.
- 26. The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.
- 29. An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
- 30. The use of protocol analyzer software to obtain sensitive information, such as user names and passwords.
- 31. ABBREVIATION ONLY. A backup technique that saves every change made to computer data; it allows data restore at any point in time.
- 32. INCLUDE DASH. A firewall component that inspects all packets addressed to a user-level application; uses proxies to control and filter traffic on a connection-by-connection basis. It also provides authentication.
- 33. The practice of hiding internal IP addresses from the external network.
- 35. plan implemented to manage employee personal mobile devices on a company network.
- 36. The length of time a system can be offline before the business is affected.
Down
- 1. A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. It must be signed by a certificate authority (CA) to be valid.
- 2. A server that mediates traffic between a protected network and the Internet. Translates IP addresses and filters traffic.
- 4. In an anti-virus program, a collection of viruses, worms, and illicit applications that are listed as security threats.
- 6. A single piece of hardware that runs multiple operating systems, such as a server that uses virtualization software to run Windows and Linux OS concurrently.
- 7. A network that connects enterprise intranets to the global Internet. Designed to provide access to selected external users.
- 8. An unauthorized user who penetrates a host or network to access and manipulate data.
- 9. A software application you can use to store and manage multiple passwords.
- 10. A self-replicating program or algorithm that consumes system resources.
- 11. Fraud committed in your name by someone else who has illicitly gained access to your personal information.
- 14. An application that installs hidden services on systems. Illicit servers consist of "client" code and "server" code that enable the attacker to monitor and control the operation of the computer infected with the server code.
- 17. ABBREVIATION ONLY.The growing movement of employees who bring their own devices, such as smartphones and tablets, to work.
- 19. A scam or other deceptive practice committed via the Internet, usually for the purpose of monetary gain or identity theft.
- 20. An algorithm that receives input from a random or pseudo-random number generator and automatically generates a password.
- 22. A credit card that replaces the magnetic strip with an embedded chip for storing or processing data.
- 24. A protocol that encapsulates data packets into another packet.
- 27. ABBREVIATION ONLY. A protocol that allows users and corporations to securely extend their networks over the Internet using remote access servers. Used to create VPNs.
- 28. An attack in which packets are obtained from the network or a network host, then reused.
- 34. ABBREVIATION ONLY. An authentication and encryption standard that provides security over the Internet. It functions at Layer 3 of the OSI/RM and can secure all packets transmitted over the network.