Code that runs on a computer without the user’s knowledge. Infects the computer when the code is accessed and executed.
Virus
The most basic form of firewall that is rule based.
Stateless
A protocol that is used for file transfers using SSH for security
SFTP
The act of quarantining of a system from its network surroundings
sandboxing
A simpler form of encryption where the sender and receiver both have the same key
Symmetric
A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.
Worm
Specifically designed to filter HTTP and HTTPS traffic
Web application firewall (WAF)
A protocol used for securely browsing objects in an AD domain
LDAPS
An OS designed to have as close to zero latency as possible
RTOS
Provide for message authenticity. Nonrepudiation
Digital signature
It collects information about the user without the user’s consent
Spyware
Network that functions as a subnetwork containing an organization's exposed, outward-facing services. It acts as the exposed point to an untrusted networks, commonly the Internet
DMZ
A protocol used to connect to a website secure
HTTPS
A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit
Waterhole Attack
Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection
Steganography
Malicious software that is deliberately installed for a pre-programmed date
Logic Bomb
Cisco proprietary AAA server and protocol
TACACS+ Terminal Access Controller Access-Control System
RADIUS ports numbers
1812 and 1813
A server that provides a single point of access from an external network to the resources located in a private network
Jumpbox
The IEEE standard for wireless network security. Uses AES block cipher
WPA2
Encrypts files stored on a computer and demands payment by a third party
Ransomware/Crypto malware
A device that is an appliance, server, or application that accepts requests for access to resources on other servers and then applies filters, caches data, or translates the data that is returned.
Proxy
An encrypted program used for remote connections to a server using command line interface
SSH
Computing platforms are available through the cloud. You just supply the applications.
PaaS
Commonly referred to as “public key cryptography”
Asymmetric