Java Games: Flashcards, matching, concentration, and word search.

MTA Security Fundamentals Session 2

AB
Windows Registryis a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems.
FATFile Allocation Table
NTFS(New Technology File System) is the file system that the Windows NT operating system (XP, Windows 7, 8, 10) uses for storing and retrieving files on a hard disk.
Active DirectoryIs a special-purpose database run on a Windows Server to provide authentication and authorization to resources.
Windows PermissionsAllows or denies changing the attributes of a file or folder, such as read-only or hidden. Attributes are defined by NTFS. The Write Attributes permission does not imply creating or deleting files or folders, it only includes the permission to make changes to the attributes of a file or folder.
AuditingEstablishing audit policy is an important facet of security. Monitoring the creation or modification of objects gives you a way to track potential security problems, helps to ensure user accountability, and provides evidence in the event of a security breach.
Wiretappingthe practice of connecting a listening device to a telephone line to secretly monitor a conversation.
Wormis a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
Trojan Horseis a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.
Malwaresoftware that is intended to damage or disable computers and computer systems
Buffer OverflowIn computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites memory in adjacent locations. This is a special case of the violation of memory safety.
Security ZonesInternet Explorer divides your Internet world into zones, so that you can assign a Web site to a zone with a suitable security level. There are four zones: Internet, Local Intranet, Trusted Sites and Restricted Sites
CookiesA small text file (up to 4KB) created by a Web site that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site to recognize you and keep track of your preferences.
Encryptionis the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
Symmetric encryptionis the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way.
Asymmetric encryptionis a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt. Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it.
Inherited permissionsare those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container.
Group Policiesis an infrastructure that allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory directory service containers: sites, domains, or organizational units (OUs).
CryptographyThe conversion of data into a secret code for transmission over a public network. Today, most cryptography is digital, and the original text ("plaintext") is turned into a coded equivalent called "ciphertext" via an encryption algorithm.
Stream Cipheris a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream.
Block Ciphersis a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key.
PKI(Public key infrastructure) In cryptography, this is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain.



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities