Tuesday, February 18, 2020

Network+ Chapter 11A Power Words - Defined

Network + Chapter 11A
  1. 802.1x: A port-authentication network access control mechanism for networks.
  2. access control list (ACL): A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
  3. Advanced Encryption Standard (AES): A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.
  4. Algorithm: A set of rules for solving a problem in a given number of steps.
  5. asymmetric-key algorithm: An encryption method in which the key used to encrypt a a message and the key used to decrypt it are different, or asymmetrical.
  6. Authentication: A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers.
  7. Authenticating, Authorization, and Accounting (AAA): A security philosophy wherein a computer trying to connect to a network must first present some form of credential in order to be authenticated and then must have limitable permissions within the network.
  8. Authentication Server (AS): In Kerberos, a system that hands out Ticket-Granting Tickets to clients after comparing the client hash to it's own. Also known as Ticket Granting Ticket.
  9. Authorization: A step in the AAA philosophy during which a client's permissions are decided upon.
  10. block Cipher: An encryption algorithm in which data is encrypted in "chunks" of a certain length at a time. Popular in wired networks.
  11. Certificate: A public encryption key signed with the digital signature from a trusted third party called a Certificate Authority (CA), which is used to validate the identity of its holder when that person or company sends data to other parties.
  12. Challenge Handshake Authentication Protocol (CHAP): A remote access authentication protocol in which the serving system challenges the remote client, which must provide an encrypted password.
  13. Cipher: A series of complex and hard-to-reverse mathematics run on a string of ones and zeroes in order to make a new set of seemingly meaningless ones and zeroes.
  14. Ciphertext: The output when cleartext is run through a cipher algorithm using a key.
  15. Cleartext: Unencrypted data in an accessible format that can be read without special utilities. Also known as plaintext.
  16. Data Encryption Standard (DES): A symmetric-key algorithm develovoped by the US Government in the 1970s and formerly in use in a variety of TCP/IP applications, in which it uses a 64-bit block and a 56-bit key.
  17. digital signature: An encrypted hash of a private encryption key that verifies a sender's identity to those who receive encrypted data or messages.
  18. Discretionary Access Control (DAC): Authorization method based on the idea that there is an owner of a resource who may at his or her discretion, assign access to that resource.