Protected EAP (PEAP) - is a protocol that utilizes a secure, encrypted TLS (Transport Layer Security) tunnel to encapsulate the EAP (Extensible Authentication Protocol) authentication., EAP - provides a method for two systems to create a secure encryption key, also known as a Pairwise Master Key, Bluesnarfing - unauthorized access to, or theft of information from, a Bluetooth device., Site-to-site VPNs - provide secure access between two networks, IPsec - a common tunneling protocol used with VPNs it secures traffic within a tunnel, 802.1X - provides strong port security using port based authentication. It prevents rogue devices from connecting to a network by ensuring only authorized clients can connect , Business Email Compromise - an attacker mimics a familiar contact's email address with minor alterations to deceive the recipient into executing unauthorized financial transactions., TACACS+ - a set of security protocols for remote access authentication and related services, VM Escape - an attacker breaks out of a VM and gains access to the host system, Stateful packet inspection (SPI) - monitor all aspects of the traffic streams, their characteristics and communication channels., syslog - protocol specifies a general log entry format and the details on how to transport log entries , Target of Evaluation (TOE) - the specific system, software, or product being assessed for its security properties. It is the focal point of the security evaluation process, SAML - is an XML-based standard used to exchange authentication and authorization information between different parties and provides SSO for web-based applications , VM Sprawl - This term describes the uncontrolled proliferation of VMs, not a security threat of this nature., Regulated data - data that is governed by external laws and regulations with which the organization must comply, data controller - the entity that determines the purposes, conditions, and means of processing personal data, data processor - an entity that processes personal data on behalf of the data controller, data custodian - typically an individual or entity responsible for managing the system where the data is stored, NIC teaming - allows you to group two or more physical network adapters into a single software-based virtual network adapter, MTBF - the average time between failures, MTTR - average time it takes to restore a failed system., Fail over tests - shut down the primary site to determine whether the fail over site works properly, Intellectual property - is information that is crucial to the way that an organization runs its business, Federation - the process of linking together different systems or organizations in a way that allows them to share resources, data, and authentication mechanisms securely., OpenID - an authentication protocol used primarily for web-based single sign-on. It enables users to log in once with a single ID and access a variety of applications across different domains, simplifying the user authentication process on the internet., CHAP - allows the client to pass credentials over a public network without allowing attackers to intercept the data and later use it in an attack., EOSL (End of Service Life) - the term used to describe the final stage in a product's lifecycle, particularly in the context of software and hardware., EOL (End of Life) - refers to when a product is no longer being manufactured or sold., Stateless packet filtering - filters network traffic based solely on predefined rules without maintaining any knowledge of previous connections or sessions., screen subnet - a part of a computer network where security measures are put in place to protect the network from cyber threats.,
0%
SEC+ 701
공유
공유
공유
만든이
Definitlynotyeager
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
매치업
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?