Security utilities combined into a single tool.
What is a Security Suite?
Type of encryption algorithm in which the encryption key is the same as the decryption key
What is Symmetric encryption?
The severity level of 0.(Syslogs)
What is an Emergency?
Liability that many organizations do not consider as part of their risk assessment.
What is Downstream Liability?
Someone in this LC who is a Youtuber.
Who is Jordan?
Type of training that teaches personnel the skills they need to perform their jobs in a secure manner.
What is Security Training?
Consists of software, protocols, algorithms and keys. (DAILY DOUBLE)
What is a cryptosystem?
Can be used to provide message integrity.
What is Hashing?
Ensures that more than one person can perform the job tasks of a single position within an organization.
What is Cross-training?
Stands for WWW.
What is the World Wide Web?
The concept in which a person initiates a request for a payment and another person authorizes the same payment.
What is Dual Control?
Being able to determine the a sender's identity and validity through...
What is Authentication?
The filtering and summarizing of data in some way.
What is data aggregation?
More expensive to implement than symmetric algorithms.
What are Asymmetric Algorithms?
She has a Bachelor and Master's in Computer Science.(Instructor in Per Scholas)
Who is Ms. Taylor?
A scenario where two bank employees who individually know only part of the combination for the safe and must both be present to open the safe.(Type of Knowledge) ***DAILY DOUBLE***
What is Split Knowledge?
Provides proof of the origin of data.
What is Non-repudiation?
A log with a private IP address that is blocked while attempting to enter the network.
What is a firewall log?
Makes sure that patterns are not produced during encryption.
What is an IV? (Initialization vector)
He said this: "Y'all don't read!" (DAILY DOUBLE)
Who is Professor Mac?
Type of report that is a complete analysis of all vulnerabilities found and a tool for network administrators, security officers, and IT managers to assess network security.
What is a Technical report?
Performs encryption by breaking the message into fixed-length units.
What is a block cipher?
The destination IP address and port number of this Syslog entry
Sep 2 23:02:27.143: %SEC-6-IPACCESSLOGP: list ACL-IPv4-E0/0-IN permitted tcp 192.168.1.3(1026) -> 192.168.2.1(80), 1 packet (DAILY DOUBLE)
What is 192.168.2.1 port 80?
An application and a protocol that is used to remotely log in to another computer using a secure tunnel.
What is SSH?(Secure Shell)
He said this: "Stay hungry. Stay foolish."
Who is Steve Jobs?