File

advertisement
Key Terms
 Access control Encompasses four processes: identification, authentication,
authorization, and accountability.
 Access control policy A formal policy to determine how access rights are granted to
entities and groups.
 Accountability Assures that all actions on a system can be attributed to an
authenticated identity.
 Advanced Encryption Standard (AES) A Federal Information Processing Standard
(FIPS) specified cryptographic algorithm for use within the U.S. government to protect
unclassified information.
 Agent Synonymous with sensor. This is a piece of software that resides on a system and
reports back to a management server.
 Application-level firewall A device, typically a computer, that provides a defense
between a network inside the firewall and a network outside the firewall (the Internet)
that could pose a threat to the inside network. All traffic to and from the network must
pass through the firewall, so that unauthorized traffic can be blocked.
 Asymmetric encryption Synonymous with public key encryption. A method of
communicating on a network using two different but related keys, one to encrypt and
the other to decrypt messages.
 Token Device A device that uses a challenge response method, in which a server
challenges a user during login with a numerical sequence. The user places the sequence
into a token, which generates a response that is entered to gain access.
 Authentication The process of validating a supplicant’s purported identity. It ensures
that the entity requesting access is the entity claimed.
 Authorization Determines which actions that entity can perform in that physical or
logical area.
 Authorization ticket In a client/server environment, a token issued to a particular client
that verifies to a server that the client is requesting services on behalf of an authorized
user and that the client is a valid member of a system and therefore authorized to
receive services.
 Bastion host Synonymous with sacrificial host. A dedicated firewall that enables a
router to prescreen data packets to minimize the network traffic and load on a proxy
server.
 Behavior-based IDPS Or statistical anomaly-based IDPS. Able to detect new types of
attacks because it looks for abnormal activity of any type.
 Biometric Literally means life measurement.
 Cache server The server used by proxy servers to temporarily store frequently accessed
pages.
 Certificate authority (CA) An agency that manages the issuance of digital certificates
and serves as the electronic notary public to verify their worth and integrity.
 Ciphertext A message that is formed when plaintext data is encrypted by a
cryptosystem.
 Clipping level When the activity falls outside the baseline parameters it is known as the
clipping level.
 Content filter A software device that allows administrators to work within a network to
restrict accessibility to information.
 Crossover error rate (CER) Evaluation criteria for biometric technologies, the
crossover rate is the point at which the number of false rejections (denial of access to




















authorized users) equals the number of the false acceptances (granting of access to
unauthorized users).
Cryptanalysis The methodologies used to obtain information from encoded messages
when the cryptographic algorithm and/or keys are unknown.
Cryptography From the Greek work kryptos, meaning hidden, and graphein, meaning
to write. The enciphering and deciphering of coded messages.
Cryptology The science of encryption; a field of study that encompasses cryptography
and cryptanalysis.
Demilitarized zone (DMZ) An intermediate area between a trusted network and an
untrusted network.
Diffie-Hellman key exchange method A method for exchanging private keys using
public key encryption.
Digital certificate An electronic document attached to a file that certifies the file is
from the organization it claims to be from and has not been modified from the original
format.
Digital signature An encrypted message that is independently verified as authentic by a
central facility (registry).
Dumb cards ID cards or ATM cards with magnetic stripes containing the digital (and
often encrypted) user personal identification number (PIN) against which a user input is
compared; performs no computation as contrasted with smart cards, which can perform
some computations using an onboard processor.
Dynamic packet filtering firewall A firewall that allows only a particular packet with
a particular source, destination, and port address to enter through the firewall.
Encryption The process of converting an original message into a form that is
unreadable by unauthorized individuals.
False accept rate The percentage or value associated with the rate at which fraudulent
users or nonusers are allowed access to systems or areas as a result of a failure in the
biometric device.
False reject rate The percentage or value associated with the rate at which authentic
users are denied or prevented access to authorized areas as a result of a failure in the
biometric device.
Fingerprinting A data-gathering process that discovers the assets that can be accessed
from a network, usually performed in advance of a planned attack. It is the systematic
examination of the entire set of Internet addresses of the organization.
Firewall A device that provides a defense between a more trusted network inside the
firewall and a less trusted network outside the firewall (the Internet) that filters network
traffic that could pose a threat to the inside network. All traffic to and from the network
must pass through the firewall, so that unauthorized network traffic can be blocked.
Footprint The geographic area within which a wireless access point provides sufficient
signal strength to maintain a connection.
Footprinting The identification of the Internet addresses that are owned or controlled
by an organization.
Honeypot A computer server configured to misdirect hackers by resembling a
production system that contains substantial information.
Host-based IDPS Works by configuring and classifying various categories of systems
and data files. Host-based IDPSs can monitor multiple computers simultaneously.
Identification The mechanism that provides information about an unverified entity—
called a supplicant—that wants to be granted access to a known entity.
IEEE 802.11i An amendment to the 802.11. It specifies security protocols for wireless
networks.
 Intrusion detection and prevention systems (IDPSs) These work like burglar alarms.
When the system detects a violation—the IT equivalent of an opened or broken
window—it activates the alarm. This alarm can be audible and visible (noise and
lights), or it can be a silent alarm that sends a message to a monitoring company.
 IP Security (IPSec) The primary and dominant cryptographic authentication and
encryption product of the IETF’s IP Protocol Security Working Group.
 Kerberos A cryptosystem that uses symmetric key encryption to validate an individual
user to various network resources.
 Minutiae In biometrics, unique points of reference that are digitized and stored in an
encrypted format for comparison with scanned human characteristics.
 Monoalphabetic substitution In encryption, the substitution of one value for another
using a single alphabet.
 Network-address translation (NAT) A method of mapping real, valid, external IP
addresses to special ranges of internal IP addresses, creating a barrier to internal
intrusion.
 Network-based IDPSs A systems that monitors network traffic for potential intrusion
activity. When a predefined condition occurs, the network-based IDPS notifies the
appropriate administrator or takes defined actions based in predetermined conditions.
 Nonrepudiation A message characteristic wherein the fact that a message was sent by a
particular entity cannot be refuted.
 Open port Open port can be used to send commands to a computer, gain access to a
server, and exert control over a networking device.
 Packet filtering firewall A type of networking device that filters data packets based on
their network-level headers as they travel in and out of an organization’s network.
 Packet sniffer A network tool that collects copies of packets from the network and
analyzes them.
 Passphrase A series of characters, typically longer than a password, from which a
virtual password is derived.
 Password A private word or combination of characters that only the user knows.
 Permutation cipher Synonymous with transposition cipher. The rearranging of values
within a block to create coded information.
 Plaintext Synonymous with cleartext. The unencrypted message that will be encrypted
into ciphertext for transmission over an unsecured channel.
 Polyalphabetic substitutions In encryption, the substitution of one value for another,
using two or more alphabets.
 Port A network channel or connection point in a data communications system.
 Port-address translation (PAT) It converts a single real, valid, external IP address to
special ranges of internal IP addresses.
 Port scanners The tools used to identify (or fingerprint) computers that are active on a
network.
 Pre-shared keys Authentication server can issue keys to authenticated users.
Sometimes users are allowed to share a key. Use of these pre-shared keys is quite
convenient but is not secure.
 Pretty Good Privacy (PGP) A hybrid cryptosystem that combines some of the best
available cryptographic algorithms. PGP is the open source de facto standard for
encryption and authentication of e-mail and file storage applications.
 Privacy Enhanced Mail (PEM) A standard proposed by the Internet Engineering Task
Force (IETF) that will function with public key cryptosystems. PEM uses 3DES
symmetric key encryption and RSA for key exchanges and digital signatures.
 Private key encryption Synonymous with symmetric encryption. A method of
communicating on a network using a single key to both encrypt and decrypt a message.
 Proxy server Synonymous with proxy firewall. A server that is configured to look like
a Web server and that performs actions on behalf of that server to protect it from
hacking.
 Public key encryption Synonymous with asymmetric encryption. A method of
communicating on a network using two different keys, one to encrypt and the other to
decrypt a message.
 Remote Authentication Dial-in User Service (RADIUS) A system that authenticates
the credentials of users who are trying to access an organization’s network through a
dial-up connection.
 Sacrificial host Synonymous with bastion host. A dedicated firewall that enables a
router to prescreen data packets to minimize the network traffic and load on a proxy
server.
 Secret key In symmetric encryption, the single key shared by both parties. In
asymmetric encryption, the private key retained by the owner for use in decrypting
messages encrypted with owner’s public key.
 Secure Electronic Transactions (SET) A standard developed by MasterCard and
VISA in 1997 to provide protection from electronic payment fraud. It works by
encrypting the credit card transfers with DES for encryption and RSA for key exchange.
 Secure Hypertext Transfer Protocol (SHTTP) A protocol designed to enable secure
communications across the Internet. SHTTP is the application of SSL over HTTP,
which allows the encryption of all information passing between two computers through
a protected and secure virtual connection.
 Secure Multipurpose Internet Mail Extensions (S/MIME) A specification developed
to increase the security of e-mail that adds encryption and user authentication.
 Secure Shell (SSH) A popular extension to the TCP/IP protocol suite, sponsored by the
IETF. It provides authentication services between a client and a server and is used to
secure replacement tools for terminal emulation, remote management, and file transfer
applications.
 Secure Sockets Layer (SSL) A protocol for transmitting private information securely
over the Internet.
 Sensor Synonymous with agent. This is a piece of software that resides on a system and
reports back to a management server.
 Signature-based IDPS Or knowledge-based IDPS examines data traffic for something
that matches the signatures, which comprise preconfigured, predetermined attack
patterns.
 Smart card A device that contains memory and a processor that can verify and validate
a number of pieces of information about an individual beyond recording facts.
 Stateful inspection firewall Devices that track network connections that are established
between internal and external systems.
 State table A process used by a server that tracks the state and context of each
connection to authenticate the exchange of packets by recording which host sent which
packet, when, and to which remote host.
 Statistical anomaly-based IDPS (stat IDPS) or behavior based IDPS. Able to detect
new types of attacks because it looks for abnormal activity of any type.
 Strong authentication The use of two or more authentication mechanism types to
authenticate a single transaction or session; for example, the use of something you have
and something you know as occurs when making an ATM banking transaction.
 Substitution cipher In encryption, the substitution of one value for another.
 Supplicant An entity requesting access to a controlled system. May be a person or
other entity attempting to gain access to an information or other system.
 Symmetric encryption Synonymous with private key encryption. Symmetric
encryption is a method of communicating on a network using a single key to both
encrypt and decrypt a message.
 Synchronous tokens Authentication devices that are synchronized with a server so that
each device (server and token) uses the time or a time-based database to generate a
number that is entered during the user login phase.
 Systems logs Records maintained by a particular system that has been configured to
record specific information, such as failed access attempts and systems modifications.
Logs have many uses, such as intrusion detection, determining the root cause of a
system failure, or simply tracking the use of a particular resource.
 Terminal Access Controller Access Control System (TACACS) A remote access
system that validates a user’s credentials.
 Transport mode One of the two modes of operation of the IP Security Protocol. In
transport mode, only the IP data is encrypted, not the IP headers.
 Transposition cipher Synonymous with permutation cipher. The rearranging of values
within a block to create coded information.
 Triple DES (3DES) It is an improvement to DES and uses as many as three keys in
succession. It is substantially more secure than DES, not only because it uses as many
as three keys instead of one, but also because it performs three different encryption
operations.
 Trusted network A network segment that has had some degree of protection
established (such as an intranet that is inside an organization’s firewall) and is therefore
perceived as being less susceptible to attack or loss.
 Tunnel mode One of the two modes of operation of the IP Security Protocol. In tunnel
mode, the entire IP packet is encrypted and placed as payload into another IP packet.
 Untrusted network A network segment perceived as uncontrolled, such as the Internet.
 Virtual password A password calculated or extracted from a passphrase that meets
system storage requirements.
 Virtual private networks (VPNs) A network within a network that typically allows a
user to use the Internet as a private network.
 Vulnerability scanner A device that scans servers to identify exposed usernames,
shows open network shares, and exposes configuration problems and other
vulnerabilities.
 War dialer An automatic phone-dialing program that dials every number on a list or in
a configured range (e.g., 555-1000 to 555-2000), and checks to see if a person,
answering machine, or modem picks up.
 War driving A technique used to determine the location of wireless access points and
then assess that access point’s security requirements with the intent to determine if an
unauthorized connection is possible.
 Wi-Fi Protected Access (WPA) A family of protocols used to secure wireless
networks. It was initially developed as an intermediate solution known as WPA.
Currently known as WPA2, it incorporates the IEEE 802.11i standards.
 Wired Equivalent Privacy (WEP) Part of the IEEE 802.11 wireless networking
standard designed to provide a basic level of security protection to these radio networks
with an intent to prevent unauthorized access or eavesdropping.
 Wireless access point (WAP) A radio transceiver device that enables radio-frequency
network access to a local area network.
 WPA2 A second-generation version of Wi-Fi Protected Access that provides increased
capabilities for authentication and encryption, and increased throughput as compared to
WEP.
 XOR cipher conversion A programming algorithm that uses the Boolean XOR
function to combine binary digits from two data streams, one with a clear text and the
other with an encryption key, to produce an encrypted data stream.
Download