| A | B |
| access control | security concept using physical security, authentication, users and groups, and security policies |
| adware | Type of malicious program that downloads ads to user's computer, generating undesirable network traffic |
| antivirus program | Software designed to combat viruses by either seeking out and destroying them or passively guarding against them |
| authentication | Any method a computer uses to determine what an authenticated user can do |
| biometric device | Hardware device used to support authentication; works by scanning and remembering unique aspects of a user's various body parts (e.g., retina, iris, face, or fingerprint) by using some form of sensing device such as a retinal scanner |
| Challenge Handshake Authentication Protocol (CHAP) | common remote access protocol; serving system challenges the remote client, usually by means of asking for a password |
| compliance | Concept that members of an organization must abide by the rules of that organization. For a technician, this often revolves around what software can or cannot be installed on an organization's computer |
| data classification | System of organizing data according to its sensitivity. Common classifications include public, highly confidential, and top secret. |
| definition file | List of virus signatures that an antivirus program can recognize |
| digital certificate | Form in which a public key is sent from a Web server to a Web browser so that the browser can decrypt the data sent by the server. |
| dumpster diving | to go through someone's trash in search of information |
| effective permissions | User's combined permissions granted by multiple groups |
| encryption | Making data unreadable by those who do not possess a key or password |
| event auditing | Feature of Event Viewer's Security section that creates an entry in the Security Log when certain events happen, such as a users logging on |
| Event Viewer | Utility made available as an MMC snap-in that enables users to monitor various system events, including network bandwidth usage and CPU utilization |
| firewall | Device that restricts traffic between a local network and the Internet |
| Grayware | Program that intrudes into a user’s computer experience without damaging any systems or data |
| Group Policy | Means of easily controlling the settings of multiple network clients with policies such as setting minimum password length or preventing Registry edits |
| HTTPS (Hypertext Transfer Protocol Secure) | Secure form of HTTP used commonly for Internet business transactions or any time when a secure connection is required |
| Incidence reporting | Record of the details of an accident, including what happened and where it happened |
| IPSec | Microsoft’s encryption method of choice for networks consisting of multiple networks linked by a private connection, providing transparent encryption between the server and the client |
| Kerberos | Authentication encryption developed by MIT to enable multiple brands of servers to authenticate multiple brands of clients |
| Local Security Settings | Windows tool used to set local security policies on an individual system |
| MS-CHAP | Microsoft’s variation of the CHAP protocol, which uses a slightly more advanced encryption protocol. |
| object access auditing | Feature of Event Viewer’s Security section that creates an entry in the Security Log when certain objects are accessed, such as a file or folder |
| Password Authentication Protocol (PAP) | Oldest and most basic form of authentication. Also the least safe, because it sends all passwords in clear text |
| Phishing | is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically |
| polymorph virus | Virus that attempts to change its signature to prevent detection by antivirus programs, usually by continually scrambling a bit of useless code. |
| pop-up | Irritating browser window that appears automatically when you visit a Web site |
| remediation | Repairing damage caused by a virus |
| Secure Sockets Layer (SSL) | Security protocol used by a browser to connect to secure Web sites |
| Signature | Code pattern of a known virus; used by antivirus software to detect viruses |
| smart card | Hardware authentication involving a credit-card-sized card with circuitry that can be used to identify the bearer of that card |
| social engineering | Using or manipulating people inside the networking environment to gain access to that network from the outside |
| spam | Unsolicited e-mails from both legitimate businesses and scammers that accounts for a huge percentage of traffic on the Internet |