Protected EAP (PEAP) - is a protocol that utilizes a secure, encrypted TLS (Transport Layer Security) tunnel to encapsulate the EAP (Extensible Authentication Protocol) authentication., EAP - provides a method for two systems to create a secure encryption key, also known as a Pairwise Master Key, Bluesnarfing - unauthorized access to, or theft of information from, a Bluetooth device., Site-to-site VPNs - provide secure access between two networks, IPsec - a common tunneling protocol used with VPNs it secures traffic within a tunnel, 802.1X - provides strong port security using port based authentication. It prevents rogue devices from connecting to a network by ensuring only authorized clients can connect , Business Email Compromise - an attacker mimics a familiar contact's email address with minor alterations to deceive the recipient into executing unauthorized financial transactions., TACACS+ - a set of security protocols for remote access authentication and related services, VM Escape - an attacker breaks out of a VM and gains access to the host system, Stateful packet inspection (SPI) - monitor all aspects of the traffic streams, their characteristics and communication channels., syslog - protocol specifies a general log entry format and the details on how to transport log entries , Target of Evaluation (TOE) - the specific system, software, or product being assessed for its security properties. It is the focal point of the security evaluation process, SAML  - is an XML-based standard used to exchange authentication and authorization information between different parties and provides SSO for web-based applications , VM Sprawl - This term describes the uncontrolled proliferation of VMs, not a security threat of this nature., Regulated data - data that is governed by external laws and regulations with which the organization must comply, data controller - the entity that determines the purposes, conditions, and means of processing personal data, data processor - an entity that processes personal data on behalf of the data controller, data custodian - typically an individual or entity responsible for managing the system where the data is stored, NIC teaming - allows you to group two or more physical network adapters into a single software-based virtual network adapter, MTBF - the average time between failures, MTTR - average time it takes to restore a failed system., Fail over tests - shut down the primary site to determine whether the fail over site works properly, Intellectual property - is information that is crucial to the way that an organization runs its business, Federation - the process of linking together different systems or organizations in a way that allows them to share resources, data, and authentication mechanisms securely., OpenID - an authentication protocol used primarily for web-based single sign-on. It enables users to log in once with a single ID and access a variety of applications across different domains, simplifying the user authentication process on the internet., CHAP - allows the client to pass credentials over a public network without allowing attackers to intercept the data and later use it in an attack., EOSL (End of Service Life) - the term used to describe the final stage in a product's lifecycle, particularly in the context of software and hardware., EOL (End of Life) - refers to when a product is no longer being manufactured or sold., Stateless packet filtering - filters network traffic based solely on predefined rules without maintaining any knowledge of previous connections or sessions., screen subnet - a part of a computer network where security measures are put in place to protect the network from cyber threats.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?