Awareness Awareness makes the end-user community conscious of security issues, without necessarily any in-depth procedural training. For example, distributing an e-mail or pamphlet describing the issue of viruses and the importance of virus protection creates awareness of the issue.
Block cipher Derives its name from the fact that it transforms a fixed-length “block” of plain text into a “block” of ciphertext. These two blocks are the same length. When the reverse transformation is applied to the ciphertext block, by using the same secret key, it is decrypted.Block ciphers use a fixed length or block size. This generally is 128 bits, but they can range in size.For instance, DES has a block size of 64 bits.
Bootset The collection of a router’s image and configuration files that can be protected using the Cisco IOS Resilient Configuration feature, which keeps a secure copy of the bootset.
Brute-force attack Attempts to match password credentials by guessing a sequence of patterns (for example, the letter a through the letter z, followed by the letters aa through zz, followed by aaa through zzz, and so on). In such an attack, all possible combinations are used until the password is discovered. This may require a great deal of time, but it always eventually succeeds in discovering the password.
Buffer overflow A programming error that may result in erratic program behavior, a memory access exception and program termination, or a possible breach of system security.
Call agent Replaces many of the features previously provided by Private Branch Exchanges (PBX). For example, a call agent can be configured with rules that determine how calls are forwarded. Cisco Unified Communications Manager (UCM) is an example of a call agent.
Catastrophe A disruption category in which all resources at a site are destroyed, and normal business operations must be moved to an alternative site.
Certificate A document issued and signed by the certificate authority (CA) that binds the name of the entity and its public key.
Certificate authority (CA) A trusted third party responsible for signing the public keys of entities in a PKI-based system.
Challenge Handshake Authentication Protocol (CHAP)
An authentication scheme used by Point-to-Point Protocol (PPP) to validate the identity of remote clients. CHAP periodically verifies the client’s identity by using a three-way handshake. Verification is based on a shared secret. CHAP also is the mandatory protocol for iSCCI, as chosen by the Internet Engineering Task Force (IETF). CHAP is based on shared secrets. It periodically verifies the client’s identity by using a three-way handshake. This verification is based on a shared secret. With CHAP, the password never actually crosses the wire, just a hash of the challenge, hostname, and password.

No comments:
Post a Comment