P

packet filtering

A firewall technology that accepts or rejects packets based on their content.

packet switching

The process of breaking messages into packets at the sending router for easier transmission over a WAN. See also frame relay.

pad

A number of characters often added to a data before an operation such as hashing takes place. Most often unique values, known as onetime pads, are added to make the resulting hash unique. While slight differences exist, the term salt can be used interchangeably for most purposes.

PAP

See Password Authentication Protocol.

partitioning

The process of breaking a network into smaller components that can each be individually protected.

passive detection

A type of intruder detection that logs all network events to a file for an administrator to view later.

passive response

A non-active response such as logging. This is the most common type of response to many intrusions. In general, passive responses are the easiest to develop and implement.

Password Authentication Protocol

One of the simplest forms of authentication. Authentication is accomplished by sending the username and password to the server and having them verified. The passwords are sent as cleartext and, therefore, easily seen if intercepted. This is why whenever possible PAP should not be used, but instead replaced with CHAP or something stronger.

password guessing

Attempting to enter a password by guessing its value.

password history

List of passwords that have already been used.

PAT

See Port Address Translation.

Patch

A fix for a known software problem.

penetration

The act of gaining access.

perimeter security

Security set up on the outside of the network or server to protect it.

PGP

See Pretty Good Privacy.

phage virus

A virus that modifies and alters other programs and databases.

physical access control

Control access measures used to restrict physical access to the server(s).

physical barriers

Objects, such as locked doors, used to restrict physical access to the network components.

physical layer

The first layer of the OSI model that controls the functional interface. See also Open Systems Interconnect.

physical security

Security that guards the physical aspects of the network.

Ping

A TCP/IP utility used to test whether another host is reachable. An ICMP request is sent to the host, who responds with a reply if it is reachable. The request times out if the host is not reachable.

Ping of Death

A large ICMP packet sent to overflow the remote host's buffer. This usually causes the remote host to reboot or hang.

point-to-point

Network communication in which two devices have exclusive access to a network medium. For example, a printer connected to only one workstation would be using a point-to-point connection.

Point-to-Point Protocol (PPP)

A full duplex line protocol that supersedes SLIP (Serial Line Internet Protocol). It is a part of the standard TCP/IP suite and often used in dial-up connections.

Point-to-Point Tunneling Protocol (PPTP)

An extension to PPP that is used in VPNs. An alternative to PPTP is L2TP.

policies

Rules or standards governing usage.

polymorphic

An attribute that some viruses possess which allows them to mutate and appear differently each time they crop up. The mutations make it harder for virus scanners to detect (and react) to them.

POP (Post Office Protocol)

An e-mail access program that can be used to retrieve e-mail from an e-mail server.

POP3

See Post Office Protocol Version 3.

port

Some kind of opening that allows network data to pass through. See also physical port.

port

An interface on a computer where you can connect a device.

Port Address Translation

Similar to NAT (which translates addresses between public and private), PAT translates between ports on a public and private network.

port scanner

A port scanner is the actual item (physical or software) that scans a server for open ports that can be taken advantage of. Port scanning is the process of sending messages to ports to see which ones are available and which ones are not.

post mortem

Anything that occurs "after the fact," such as an audit or review.

Post Office Protocol Version 3 (POP3)

The protocol used to download e-mail from an SMTP e-mail server to a network client. See also Simple Mail Transfer Protocol.

POTS (Plain Old Telephone Service)

Standard telephone service, as opposed to other connection technologies like DSL.

power conditioners

Devices that "condition" the electrical supply to take out spikes and surges.

power systems

Devices that provide electrical power.

PPP

See Point-to-Point Protocol.

PPTP

See Point-to-Point Tunneling Protocol.

Presentation layer

The sixth layer of the OSI model; responsible for formatting data exchange, such as graphic commands, and conversion of character sets. Also responsible for data compression, data encryption, and data stream redirection. See also Open Systems Interconnect.

preservation of evidence

The process of controlling access to evidence, often by placing it in a controlled access area, with a single custodian responsible for all access.

privacy

A state of security in which information is not being seen by unauthorized parties without the express permission of the party involved.

Private Branch Exchange (PBX)

A system that allows users to connect voice, data, pagers, networks, and almost any other conceivable application into a single telecommunications system. In short, a PBX system allows a company to be its own phone company.

private information

Information that is not for public knowledge.

Pretty Good Privacy (PGP)

A shareware implementation of RSA encryption. See also RSA Data Security, Inc.

private key

A technology in which both the sender and the receiver have the same key. A single key is used to encrypt and decrypt all messages. See also public key.

private network

The part of a network that lies behind a firewall and is not "seen" on the Internet. See also firewall.

privilege audits

Audits performed to verify that no user is accessing information, or able to access information, beyond the security level at which they should be operating.

privilege escalation

The term used to describe a user obtaining access to a resource they would not normally be able to access. This can be done inadvertently—by running a program with SUID (Set User ID) or SGID (Set Group ID) permissions—or by temporarily becoming another user (via su or sudo in Unix/Linux or RunAs in Windows 2000).

process list

The list of processes currently running on the system. In Windows NT/2000, this can be seen with Task Manager, while the ps command will show such in Unix/Linux. This is one of the first places to look for rogue processes running on a server.

promiscuous mode

With network interface cards, this is a mode wherein they intercept all traffic crossing the network wire, and not just that intended for them.

protocol analyzer

A software and hardware troubleshooting tool that is used to decode protocol information to try to determine the source of a network problem and to establish baselines.

protocols

Standards or rules.

proxy

A type of firewall that prevents direct communication between a client and a host by acting as an intermediary. See also firewall.

proxy cache server

An implementation of a web proxy. The server receives an HTTP request from a web browser and makes the request on behalf of the sending workstation. When the response comes, the proxy cache server caches a copy of the response locally. The next time someone makes a request for the same web page or Internet information, the proxy cache server can fulfill the request out of the cache instead of having to retrieve the resource from the Web.

proxy firewall

A proxy server that also acts as a firewall, blocking network access from external networks.

proxy server

A type of server that makes a single Internet connection and services requests on behalf of many users.

public key

A technology that uses two keys to facilitate communication, a public key and a private key. The public key is used to encrypt or decrypt a message to a receiver. See also private key.

Public Key Cryptography Standards (PKCS)

A set of voluntary standards created by RSA security and industry security leaders.

Public Key Infrastructure (PKI)

A twokey encryption system wherein messages are encrypted with a private key and decrypted with a public key.

Public Key Infrastructure X.509 (PKIX)

The working group formed by the IETF to develop a standards and models for the PKI environment.

public-key system

Encryption systems that employ a key that is known to users beyond the recipient.

public information

Information that is publicly made available to all.

public network

The part of a network on the outside of a firewall that is exposed to the public. See also firewall.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net