An authentication protocol that periodically reauthenticates.
Challenge Handshake Authentication Protocol
CHAP
Challenge Handshake Authentication Protocol
Also called packet sniffers, are some of the most common tools used
by network administrators.
Protocol analyzers
The point at which the FRR and FAR are equal.
Sometimes called the equal error rate (ERR).
crossover error rate
CER
crossover error rate
Is a common packet sniffer for Linux
tcpdump
Any technique that prevents a program from
running without the user’s approval.
data execution prevention (DEP)
DEP
data execution prevention
One of the most widely known network packet sniffers.
Wireshark
Software or techniques designed to detect attempts
to exfiltrate data.
data loss prevention
DLP
data loss prevention
A commercial network scanner
Solar Winds
The rate at which a biometric solution allows in
individuals it should have rejected
false acceptance rate (FAR)
FAR
false acceptance rate
Used to scan your network for vulnerabilities
Vulnerability Scanners
The rate at which a biometric solution rejects
individuals it should have allowed
false rejection rate (FRR)
FRR
false rejection rate
The most widely used vulnerability scanner
Nessus
A collection of computer networks that agree on standards of operation, such as security standards
federation
OAUTH
Open Authorization standard
A fundamental command line utility used to find out if a particular website is reachable
Ping
An authentication protocol developed at MIT that uses tickets for authentication.
Kerberos
A tool that enumerates your network and provides a map of the network.
network scanner