Java Games: Flashcards, matching, concentration, and word search.

MTA 98-367 Fund of Sec Lesson 2 Activities

AB
access control list (ACL)A list of all users and groups that have access to an object.
accountingAlso known as auditing
Active DirectoryActive Directory is a directory service technology created by Microsoft that provides a variety of network services
administrative shareA shared folder typically used for administrative purposes.
asymmetric encryptionAlso known as public key cryptography
auditingAlso known as accounting
authenticationThe process of identifying an individual
authorizationThe process of giving individuals access to system objects based on their identity.
biometricsAn authentication method that identifies and recognizes people based on physical traits
BitLocker To GoA new feature in Windows 7 that enables users to encrypt removable USB devices
brute force attackA type of attack that tries as many possible combinations of characters as time and money permit.
built-in groupsThe default groups that are included within Windows or Active Directory.
certificate chainAlso known as the certification path
certificate revocation list (CRLA list of certificates (or more specifically
computer accountA logical object that provides a means for authenticating and auditing a computer's access to a Windows network
decryptionThe process of converting data from encrypted format back to its original format.
dictionary attackA form of attach which attempts all words in one or more dictionaries. Lists of common passwords are also typically tested.
digital certificateAn electronic document that contains an identity
digital signatureA mathematical scheme that is used to demonstrate the authenticity of a digital message or document. It is also used to prove that the message or document has not been modified.
domain controllerA Windows server that stores a replica of the account and security information of a domain and defines the domain boundaries.
domain userA user account stored on the domain controller and allows you to gain access to resources within the domain
effective permissionsActual permissions when logging in and accessing a file or folder. They consist of explicit permissions plus any inherited permissions.
encryptionThe process of converting data into a format that cannot be read by another user. Once a user has encrypted a file
explicit permissionPermissions granted directly to a file or folder.
groupA collection or list of user accounts or computer accounts.
hash functionas a one-way encryption
inherited permissionPermissions granted to a folder (parent object or container) that flows into child objects (subfolders or files) inside that folder.
IP Security (IPsec)A suite of protocols that provides a mechanism for data integrity
KerberosThe default domain computer network authentication protocol
KeyCan be thought of as a password
local user accountA user account that is stored in the Security Account Manager (SAM) database on the local computer.
member serverA server that is not running as a domain controller.
multifactor authenticationWhen two or more authentication methods are used to authenticate someone.
nonrepudiationPrevents one party from denying the actions it has carried out.
NTFSThe preferred file system for today’s Windows operating system.
NTFS PermissionPermissions that allow you to control which users and groups can gain access to files and folders on an NTFS volume.
NTLMThe default authentication protocol for Windows NT
organizational units (OU)A container used in Active Directory to help organize objects within a domain and minimize the number of domains.
ownerA identity that controls an object including what permissions are set on the object and to whom permissions are granted.
passwordA secret series of characters that enables a user to access a particular file
permissionDefines the type of access that is granted to an object (an object can be identified with a security identifier) or object attribute.
personal identification number (PINA secret numeric password shared between a user and a system that can be used to authenticate the user to the system.
public key infrastructure (PKI)A system consisting of hardware
registryA central
rightAuthorizes a user to perform certain actions on a computer
Secure Sockets Layer (SSL)A cryptographic system that uses two keys to encrypt data
Security Account Manager (SAMA local security database found on most Windows computers.
security tokenA physical device that an authorized computer services user is given to ease authentication.
share permissionspermissions assigned to shared folders or drives.
shared folderTechnology that allows access of data files over the network.
single sign-on (SSO)Technology that allows you to log on once and access multiple related but independent software systems without having to log in again.
smart cardA pocket-sized card with embedded integrated circuits consisting of nonvolatile memory storage components and perhaps dedicated security logic.
symmetric encryptionUses a single key to encrypt and decrypt data.
SyslogA standard for logging program messages that can be accessed by devices that would not otherwise have a method for communications.
user accountA logical object that enables a user to log on to a computer and domain.
virtual private network (VPN)Technology that links two computers through a wide-area network such as the Internet. To keep the connection secure


Business & IT Teacher
Spotsylvania High School
Spotsylvania, VA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities