Security Term Defination
Security Term Defination
Security Term Defination
ACL
Accounting: Keeping records of what resources and services your users access or what
they did when they were using your systems
Auditing: It involves reviewing records to ensure that nothing is out of the ordinary
Authorization: It pertains to describing what the user account has access to or doesn't
have access to
Certificate Revocation List (CRL): A means to distribute a list of certificates that are no
longer valid
Client certificates: They operate very similarly to server certificates but are presented by
clients and allow servers to authenticate and verify clients
Counter-based tokens: They use a secret seed value along with the secret counter value
that's incremented every time a one-time password is generated on the device
Data information tree: A structure where objects will have one parent and can have one
or more children that belong to the parent object
Distinguished name (DN): A unique identifier for each entry in the directory
Kerberos: A network authentication protocol that uses tickets to allow entities to prove
their identity over potentially insecure channels to provide mutual authentication
Network time protocol (NTP): A network protocol used to synchronize the time between
the authenticator token and the authentication server
OAuth: An open standard that allows users to grant third-party websites and
applications access to their information without sharing account credentials
One-time password (OTP): A short-lived token, typically a number that's entered along
with a username and password
One-time password (OTP) tokens: Another very common method for handling multifactor
OpenID: An open standard that allows participating sites known as Relying Parties to
allow authentication of users utilizing a third party authentication service
Organizational units (OUs): Folders that let us group related objects into units like
people or groups to distinguish between individual user accounts and groups that
accounts can belong to
Physical tokens: They take a few different forms, such as a USB device with a secret
token on it, a standalone device which generates a token, or even a simple key used
with a traditional lock
Remote Authentication Dial-in User Service (RADIUS): A protocol that provides AAA
services for users on a network
Risk mitigation: Understanding the risks your systems face, take measures to reduce
those risks, and monitor them
Single Sign-on (SSO): An authentication concept that allows users to authenticate once
to be granted access to a lot of different services and applications
TACACS+: It is a device access AAA system that manages who has access to your
network devices and what they do on them
Ticket granting service (TGS): It decrypts the Ticket Granting Ticket using the Ticket
Granting Service secret key, which provides the Ticket Granting Service with the client
Ticket Granting Service session key
XTACACS: It stands for Extended TACACS, which was a Cisco proprietary extension
on top of TACACS
Advanced Encryption Standard (AES): The first and only public cipher that's approved
for use with top secret information by the United States National Security Agency
Asymmetric encryption: Systems where different keys are used to encrypt and decrypt
Availability: Means that the information we have is readily accessible to those people
that should have it
Backdoor: A way to get into a system if the other methods to get in a system aren't
allowed, it's a secret entryway for attackers
Baiting: An attack that happens through actual physical contact, enticing a victim to do
something
Block ciphers: The cipher takes data in, places that into a bucket or block of data that's
a fixed size, then encodes that entire block as one unit
Bots: Machines compromised by malware that are utilized to perform tasks centrally
controlled by an attacker
Brute force attacks: A common password attack which consists of just continuously
trying different combinations of characters and letters until one gets access
C
CA (Certificate authority): It's the entity that's responsible for storing, issuing, and
signing certificates. It's a crucial component of the PKI system
Caesar cipher: A substitution alphabet, where you replace characters in the alphabet
with others usually by shifting or rotating the alphabet, a set of numbers or characters
Central repository: It is needed to securely store and index keys and a certificate
management system of some sort makes managing access to storage certificates and
issuance of certificates easier
Certificate fingerprints: These are just hash digests of the whole certificate, and aren't
actually fields in the certificate itself, but are computed by clients when validating or
inspecting certificates
Certificate Revocation List (CRL): A means to distribute a list of certificates that are no
longer valid
Certificate Signature Algorithm: This field indicates what public key algorithm is used for
the public key and what hashing algorithm is used to sign the certificate
CIA Triad: Confidentiality, integrity, and availability. Three key principles of a guiding
model for designing information security policies
Code signing certificates: It is used for signing executable programs and allows users of
these signed applications to verify the signatures and ensure that the application was
not tampered with
Cross-site scripting (XSS): A type of injection attack where the attacker can insert
malicious code and target the user of the service
Cryptography: The overarching discipline that covers the practice of coding and hiding
messages from third parties
Cryptology: The study of cryptography
Data binding and sealing: It involves using the secret key to derive a unique key that's
then used for encryption of data
Decryption: The reverse process from encryption; taking the garbled output and
transforming it back into the readable plain text
Denial-of-Service (DoS) attack: An attack that tries to prevent access to a service for
legitimate users by overwhelming the network or server
Deterministic: It means that the same input value should always return the same hash
value
Dictionary attack: A type of password attack that tries out words that are commonly
used in passwords, like password, monkey, football
DNS Cache Poisoning Attack: It works by tricking a DNS server into accepting a fake
DNS record that will point you to a compromised DNS server
ECDH & ECDSA: Elliptic curve variants of Diffie-Hellman and DSA, respectively
Eliptic curve cryptography (ECC): A public key encryption system that uses the
algebraic structure of elliptic curves over finite fields to generate secure keys
Encapsulating security payload: It's a part of the IPsec suite of protocols, which
encapsulates IP packets, providing confidentiality, integrity, and authentication of the
packets
Encryption: The act of taking a message (plaintext), and applying an operation to it
(cipher), so that you receive a garbled, unreadable message as the output (ciphertext)
Encryption algorithm: The underlying logic or process that's used to convert the
plaintext into ciphertext
Entropy pool: A source of random data to help seed random number generators
Evil twin: The premise of an evil twin attack is for you to connect to a network that is
identical to yours but that is controlled by an attacker. Once connected to it, they will be
able to monitor your traffic
FIPS (Federal Information Processing Standard): The DES that was adopted as a federal
standard for encrypting and securing government data
Forward secrecy: This is a property of a cryptographic system so that even in the event
that the private key is compromised, the session keys are still safe
Frequency analysis: The practice of studying the frequency with which letters appear in
ciphertext
Full disk encryption (FDE): It is the practice of encrypting the entire drive in the system
Hashing (Hash function): A type of function or operation that takes in an arbitrary data
input and maps it to an output of a fixed size, called a hash or a digest
HTTPS: Hypertext Transfer Protocol Secure is a secure version of HTTP that ensures
the communication your web browser has with the website is secured through
encryption
I
Injection attacks: A common security exploit that can occur in software development
and runs rampant on the web, where an attacker injects malicious code
Intermediary (subordinate) CA: It means that the entity that this certificate was issued to
can now sign other certificates
IPsec (Internet Protocol security): A VPN protocol that was designed in conjunction with
IPv6
Issuer Name: This field contains information about the authority that signed the
certificate
Key: A crucial component of a cipher, which introduces something unique into your
cipher
Key signing parties: Organized by people who are interested in establishing a web of
trust, and participants perform the same verification and signing
Key size: It is the total number of bits or data that comprises the encryption key
Keylogger: A common type of spyware that's used to record every keystroke you make
Malware: A type of malicious software that can be used to obtain your sensitive
information or delete or modify files
Meddler in the middle (formerly known as Man in the Middle): An attack that places the
attacker in the middle of two hosts that think they're communicating directly with each
other
MD5: A popular and widely used hash function designed in the early 1990s as a
cryptographic hashing function
Password attacks: Utilize software like password crackers that try and guess your
password
Password salt: Additional randomized data that's added into the hashing function to
generate the hash that's unique to the password and salt combination
Phishing attack: It usually occurs when a malicious email is sent to a victim disguised as
something legitimate
Ping flood: It sends tons of ping packets to a system. If a computer can't keep up with
this, then it's prone to being overwhelmed and taken down
PKI system: A system that defines the creation, storage and distribution of digital
certificates
Public key authentication: A key pair is generated by the user who wants to authenticate
Public key signatures: Digital signature generated by composing the message and
combining it with the private key
Rainbow table attacks: To trade computational power for disk space by pre-computing
the hashes and storing them in a table
Rainbow tables: A pre-computed table of all possible password values and their
corresponding hashes
Random numbers: A very important concept in encryption because it avoids some kind
of pattern that an adversary can discover through close observation and analysis of
encrypted messages over time
Ransomware: A type of attack that holds your data or system hostage until you pay
some sort of ransom
RC4 (Rivest Cipher 4): Asymmetric stream cipher that gained widespread adoption
because of its simplicity and speed
Remote attestation: The idea of a system authenticating its software and hardware
configuration to a remote system
Risk: The possibility of suffering a loss in the event of an attack on the system
Rogue Access Point (AP) Attack: An access point that is installed on the network without
the network administrator's knowledge
Root certificate authority: They are self signed because they are the start of the chain of
trust, so there's no higher authority that can sign on their behalf
Screen lock: A security feature that helps prevent unwanted access by creating an
action you have to do to gain entry
Secure element: It's a tamper resistant chip often embedded in the microprocessor or
integrated into the mainboard of a mobile device
Secure Shell (SSH): A secure network protocol that uses encryption to allow access to a
network service over unsecured networks
Security through obscurity: The principle that if no one knows what algorithm is being
used or general security practices, then one is safe from attackers
Self-signed certificate: This certificate has been signed by the same entity that issued
the certificate
Serial number: A unique identifier for their certificate assigned by the CA which allows
the CA to manage and identify individual certificates
Session key: The shared symmetric encryption key using TLS sessions to encrypt data
being sent back and forth
SHA1: It is part of the secure hash algorithm suite of functions, designed by the NSA
and published in 1995
Shannon's maxim: It states that the system should remain secure, even if your
adversary knows exactly what kind of encryption systems you're employing, as long as
your keys remain secure
Social engineering: An attack method that relies heavily on interactions with humans
instead of computers
Spear phishing: Phishing that targets individual or group - the fake emails may contain
some personal information like your name, or the names of friends or family
SQL Injection Attack: An attack that targets the entire website if the website is using a
SQL database
SSL 3.0: The latest revision of SSL that was deprecated in 2015
SSL/TLS Client Certificate: Certificates that are bound to clients and are used to
authenticate the client to the server, allowing access control to a SSL/TLS service
SSL/TLS Server Certificate: A certificate that a web server presents to a client as part of
the initial secure setup of an SSL, TLS connection
Steganography: The practice of hiding information from observers, but not encoding it
Stream ciphers: It takes a stream of input and encrypts the stream one character or one
digit at a time, outputting one encrypted character or digit at a time
Subject: This field contains identifying information about the entity the certificate was
issued to
Subject Public Key Info: These two subfields define the algorithm of the public key along
with the public key itself
Substitution cipher: An encryption mechanism that replaces parts of your plaintext with
ciphertext
Symmetric key algorithm: Encryption algorithms that use the same key to encrypt and
decrypt messages
Tailgating: Gaining access into a restricted area or building by following a real employee
in
TLS 1.2 with AES GCM: A specific mode of operation for the AES block cipher that
essentially turns it into a stream cipher
TPM (Trusted Platform Module): This is a hardware device that's typically integrated
into the hardware of a computer, that's a dedicated crypto processor
Transport mode: One of the two modes of operations supported by IPsec. When used,
only the payload of the IP packet is encrypted, leaving the IP headers untouched
Trojan: Malware that disguises itself as one thing but does something else
Tunnel: It is provided by L2TP, which permits the passing of unmodified packets from
one network to another
Tunnel mode: One of the two modes of operations supported by IPsec. When used, the
entire IP packet, header, payload, and all, is encrypted and encapsulated inside a new
IP packet with new headers
Validity: This field contains two subfields, Not Before and Not After, which define the
dates when the certificate is valid for
Vulnerability: A flaw in the system that could be exploited to compromise the system
Worms: They are similar to viruses except that instead of having to attach themselves
onto something to spread, worms can live on their own and spread through channels
like the network
X.509 standard: It is what defines the format of digital certificates, as well as a certificate
revocation list or CRL
0-Day Vulnerability (Zero Day): A vulnerability that is not known to the software
developer or vendor, but is known to an attacker
Analyzing logs: The practice of collecting logs from different network and sometimes
client devices on your network, then performing an automated analysis on them
CCMP (counter mode CBC-MAC protocol): A mode of operation for block ciphers that
allows for authenticated encryption
Correlation analysis: The process of taking log data from different systems, and
matching events across the systems
Dynamic ARP inspection (DAI): A feature on enterprise switches that prevents certain
types of attacks
Four-Way Handshake: It is designed to allow an AP to confirm that the client has the
correct pairwise master key in a WPA-PSK setup without disclosing the PMK
GTK (Groupwise Transient Key): A temporal key, which is actually used to encrypt data
Hubs: Devices that serve as a central location through which data travels through; a
quick and dirty way of getting packets mirrored to your capture interface
Implicit deny: A network security concept where anything not explicitly permitted or
allowed should be denied
IP source guard (IPSG): It can be enabled on enterprise switches along with DHCP
snooping
Logs analysis systems: They are configured using user-defined rules to match interesting
or atypical log entries
Monitor mode: It allows to scan across channels to see all wireless traffic being sent by
APs and clients
Network software hardening: Includes things like firewalls, proxies, and VPNs
OES (Operating Encounter Mode): It turns a block cipher into a stream cipher by using a
random seed value along with an incrementing counter to create a key stream to
encrypt data with
Packet sniffing (packet capture): the process of intercepting network packets in their
entirety for analysis
Pairwise Transient Key (PTK): It is generated using the PMK, AP nonce, Client nonce,
AP MAC address, and Client MAC address
PBKDF2 (Password Based Key Derivation Function 2): Password Based Key Derivation
Function 2
PIN authentication method: It uses PINs that are eight-digits long, but the last digit is a
checksum that's computed from the first seven digits
Port mirroring: Allows the switch to take all packets from a specified port, port range, or
the entire VLAN and mirror the packets to a specified switch port
Pre-shared key: It's the Wi-Fi password you share with people when they come over and
want to use your wireless network
Proxy: Can be useful to protect client devices and their traffic. They also provide secure
remote access without using a VPN
Rainbow tables: A pre-computed table of all possible password values and their
corresponding hashes
Reverse proxy: A service that might appear to be a single server to external clients, but
actually represents many servers living behind it
Rogue DHCP server attack: An attacker can hand out DHCP leases with whatever
information they want by deploying a rogue DHCP server on your network, setting a
gateway address or DNS server, that's actually a machine within their control
Tcpdump: It's a super popular, lightweight command-line based utility that you can use
to capture and analyze packets
TKIP (Temporal Key Integrity Protocol): To address the shortcomings of WEP security
VPNs: Commonly used to provide secure remote access, and link two networks
securely
WEP (Wired Equivalent Privacy): First security protocol introduced for Wi-FI networks
Wireshark: It's another packet capture and analysis tool that you can use, but it's way
more powerful when it comes to application and packet analysis, compared to tcpdump
802.1X with EAP-TLS: Offers arguably the best security available, assuming proper and
secure handling of the PKI aspects of it
Access Control Entries: The individual access permissions per object that make up the
ACL
Accounting: Keeping records of what resources and services your users access or what
they did when they were using your systems
Advanced Encryption Standard (AES): The first and only public cipher that's approved
for use with top secret information by the United States National Security Agency
Asymmetric encryption: Systems where different keys are used to encrypt and decrypt
Auditing: It involves reviewing records to ensure that nothing is out of the ordinary
Authorization: It pertains to describing what the user account has access to or doesn't
have access to
Availability: Means that the information we have is readily accessible to those people
that should have it
Backdoor: A way to get into a system if the other methods to get in a system aren't
allowed, it's a secret entryway for attackers
Baiting: An attack that happens through actual physical contact, enticing a victim to do
something
Block ciphers: The cipher takes data in, places that into a bucket or block of data that's
a fixed size, then encodes that entire block as one unit
Bots: Machines compromised by malware that are utilized to perform tasks centrally
controlled by an attacker
Brute force attacks: A common password attack which consists of just continuously
trying different combinations of characters and letters until one gets access
CA (Certificate authority): It's the entity that's responsible for storing, issuing, and
signing certificates. It's a crucial component of the PKI system
Caesar cipher: A substitution alphabet, where you replace characters in the alphabet
with others usually by shifting or rotating the alphabet, a set of numbers or characters
Central repository: It is needed to securely store and index keys and a certificate
management system of some sort makes managing access to storage certificates and
issuance of certificates easier
Certificate fingerprints: These are just hash digests of the whole certificate, and aren't
actually fields in the certificate itself, but are computed by clients when validating or
inspecting certificates
Certificate Revocation List (CRL): A means to distribute a list of certificates that are no
longer valid
Certificate Revocation List (CRL): A means to distribute a list of certificates that are no
longer valid
Certificate Signature Algorithm: This field indicates what public key algorithm is used for
the public key and what hashing algorithm is used to sign the certificate
CIA Triad: Confidentiality, integrity, and availability. Three key principles of a guiding
model for designing information security policies
Client certificates: They operate very similarly to server certificates but are presented by
clients and allow servers to authenticate and verify clients
Code signing certificates: It is used for signing executable programs and allows users of
these signed applications to verify the signatures and ensure that the application was
not tampered with
Counter-based tokens: They use a secret seed value along with the secret counter value
that's incremented every time a one-time password is generated on the device
Cross-site scripting (XSS): A type of injection attack where the attacker can insert
malicious code and target the user of the service
Cryptography: The overarching discipline that covers the practice of coding and hiding
messages from third parties
Data binding and sealing: It involves using the secret key to derive a unique key that's
then used for encryption of data
Data information tree: A structure where objects will have one parent and can have one
or more children that belong to the parent object
Decryption: The reverse process from encryption; taking the garbled output and
transforming it back into the readable plain text
Denial-of-Service (DoS) attack: An attack that tries to prevent access to a service for
legitimate users by overwhelming the network or server
Deterministic: It means that the same input value should always return the same hash
value
Dictionary attack: A type of password attack that tries out words that are commonly
used in passwords, like password, monkey, football
Distinguished name (DN): A unique identifier for each entry in the directory
DNS Cache Poisoning Attack: It works by tricking a DNS server into accepting a fake
DNS record that will point you to a compromised DNS server
ECDH & ECDSA: Elliptic curve variants of Diffie-Hellman and DSA, respectively
Eliptic curve cryptography (ECC): A public key encryption system that uses the
algebraic structure of elliptic curves over finite fields to generate secure keys
Encapsulating security payload: It's a part of the IPsec suite of protocols, which
encapsulates IP packets, providing confidentiality, integrity, and authentication of the
packets
Encryption algorithm: The underlying logic or process that's used to convert the
plaintext into ciphertext
Entropy pool: A source of random data to help seed random number generators
Evil twin: The premise of an evil twin attack is for you to connect to a network that is
identical to yours but that is controlled by an attacker. Once connected to it, they will be
able to monitor your traffic
FIPS (Federal Information Processing Standard): The DES that was adopted as a federal
standard for encrypting and securing government data
Forward secrecy: This is a property of a cryptographic system so that even in the event
that the private key is compromised, the session keys are still safe
Frequency analysis: The practice of studying the frequency with which letters appear in
ciphertext
Full disk encryption (FDE): It is the practice of encrypting the entire drive in the system
Hashing (Hash function): A type of function or operation that takes in an arbitrary data
input and maps it to an output of a fixed size, called a hash or a digest
HTTPS: Hypertext Transfer Protocol Secure is a secure version of HTTP that ensures
the communication your web browser has with the website is secured through
encryption
Injection attacks: A common security exploit that can occur in software development
and runs rampant on the web, where an attacker injects malicious code
Intermediary (subordinate) CA: It means that the entity that this certificate was issued to
can now sign other certificates
IPsec (Internet Protocol security): A VPN protocol that was designed in conjunction with
IPv6
Issuer Name: This field contains information about the authority that signed the
certificate
Kerberos: A network authentication protocol that uses tickets to allow entities to prove
their identity over potentially insecure channels to provide mutual authentication
Key signing parties: Organized by people who are interested in establishing a web of
trust, and participants perform the same verification and signing
Key size: It is the total number of bits or data that comprises the encryption key
Key: A crucial component of a cipher, which introduces something unique into your
cipher
Keylogger: A common type of spyware that's used to record every keystroke you make
Malware: A type of malicious software that can be used to obtain your sensitive
information or delete or modify files
MD5: A popular and widely used hash function designed in the early 1990s as a
cryptographic hashing function
Meddler in the middle (formerly known as Man in the Middle): An attack that places the
attacker in the middle of two hosts that think they're communicating directly with each
other
Network time protocol (NTP): A network protocol used to synchronize the time between
the authenticator token and the authentication server
OAuth: An open standard that allows users to grant third-party websites and
applications access to their information without sharing account credentials
One-time password (OTP) tokens: Another very common method for handling multifactor
One-time password (OTP): A short-lived token, typically a number that's entered along
with a username and password
OpenID: An open standard that allows participating sites known as Relying Parties to
allow authentication of users utilizing a third party authentication service
Organizational units (OUs): Folders that let us group related objects into units like
people or groups to distinguish between individual user accounts and groups that
accounts can belong to
Password attacks: Utilize software like password crackers that try and guess your
password
Password salt: Additional randomized data that's added into the hashing function to
generate the hash that's unique to the password and salt combination
Phishing attack: It usually occurs when a malicious email is sent to a victim disguised as
something legitimate
Physical tokens: They take a few different forms, such as a USB device with a secret
token on it, a standalone device which generates a token, or even a simple key used
with a traditional lock
Ping flood: It sends tons of ping packets to a system. If a computer can't keep up with
this, then it's prone to being overwhelmed and taken down
PKI system: A system that defines the creation, storage and distribution of digital
certificates
Public key authentication: A key pair is generated by the user who wants to authenticate
Public key signatures: Digital signature generated by composing the message and
combining it with the private key
Rainbow table attacks: To trade computational power for disk space by pre-computing
the hashes and storing them in a table
Rainbow tables: A pre-computed table of all possible password values and their
corresponding hashes
Random numbers: A very important concept in encryption because it avoids some kind
of pattern that an adversary can discover through close observation and analysis of
encrypted messages over time
Ransomware: A type of attack that holds your data or system hostage until you pay
some sort of ransom
RC4 (Rivest Cipher 4): Asymmetric stream cipher that gained widespread adoption
because of its simplicity and speed
Remote attestation: The idea of a system authenticating its software and hardware
configuration to a remote system
Remote Authentication Dial-in User Service (RADIUS): A protocol that provides AAA
services for users on a network
Risk mitigation: Understanding the risks your systems face, take measures to reduce
those risks, and monitor them
Risk: The possibility of suffering a loss in the event of an attack on the system
Rogue Access Point (AP) Attack: An access point that is installed on the network without
the network administrator's knowledge
Root certificate authority: They are self signed because they are the start of the chain of
trust, so there's no higher authority that can sign on their behalf
Screen lock: A security feature that helps prevent unwanted access by creating an
action you have to do to gain entry
Secure element: It's a tamper resistant chip often embedded in the microprocessor or
integrated into the mainboard of a mobile device
Secure Shell (SSH): A secure network protocol that uses encryption to allow access to a
network service over unsecured networks
Security through obscurity: The principle that if no one knows what algorithm is being
used or general security practices, then one is safe from attackers
Self-signed certificate: This certificate has been signed by the same entity that issued
the certificate
Serial number: A unique identifier for their certificate assigned by the CA which allows
the CA to manage and identify individual certificates
Session key: The shared symmetric encryption key using TLS sessions to encrypt data
being sent back and forth
SHA1: It is part of the secure hash algorithm suite of functions, designed by the NSA
and published in 1995
Shannon's maxim: It states that the system should remain secure, even if your
adversary knows exactly what kind of encryption systems you're employing, as long as
your keys remain secure
Single Sign-on (SSO): An authentication concept that allows users to authenticate once
to be granted access to a lot of different services and applications
Social engineering: An attack method that relies heavily on interactions with humans
instead of computers
Spear phishing: Phishing that targets individual or group - the fake emails may contain
some personal information like your name, or the names of friends or family
SQL Injection Attack: An attack that targets the entire website if the website is using a
SQL database
SSL 3.0: The latest revision of SSL that was deprecated in 2015
SSL/TLS Client Certificate: Certificates that are bound to clients and are used to
authenticate the client to the server, allowing access control to a SSL/TLS service
SSL/TLS Server Certificate: A certificate that a web server presents to a client as part of
the initial secure setup of an SSL, TLS connection
Steganography: The practice of hiding information from observers, but not encoding it
Stream ciphers: It takes a stream of input and encrypts the stream one character or one
digit at a time, outputting one encrypted character or digit at a time
Subject Public Key Info: These two subfields define the algorithm of the public key along
with the public key itself
Subject: This field contains identifying information about the entity the certificate was
issued to
Substitution cipher: An encryption mechanism that replaces parts of your plaintext with
ciphertext
Symmetric key algorithm: Encryption algorithms that use the same key to encrypt and
decrypt messages
TACACS+: It is a device access AAA system that manages who has access to your
network devices and what they do on them
Ticket granting service (TGS): It decrypts the Ticket Granting Ticket using the Ticket
Granting Service secret key, which provides the Ticket Granting Service with the client
Ticket Granting Service session key
TLS 1.2 with AES GCM: A specific mode of operation for the AES block cipher that
essentially turns it into a stream cipher
TPM (Trusted Platform Module): This is a hardware device that's typically integrated
into the hardware of a computer, that's a dedicated crypto processor
Transport mode: One of the two modes of operations supported by IPsec. When used,
only the payload of the IP packet is encrypted, leaving the IP headers untouched
Trojan: Malware that disguises itself as one thing but does something else
Tunnel mode: One of the two modes of operations supported by IPsec. When used, the
entire IP packet, header, payload, and all, is encrypted and encapsulated inside a new
IP packet with new headers
Tunnel: It is provided by L2TP, which permits the passing of unmodified packets from
one network to another
U2F (Universal 2nd Factor): It's a standard developed jointly by Google, Yubico and
NXP Semiconductors that incorporates a challenge-response mechanism, along with
public key cryptography to implement a more secure and more convenient second-
factor authentication solution
Unbind: It closes the connection to the LDAP server
Validity: This field contains two subfields, Not Before and Not After, which define the
dates when the certificate is valid for
Vulnerability: A flaw in the system that could be exploited to compromise the system
Worms: They are similar to viruses except that instead of having to attach themselves
onto something to spread, worms can live on their own and spread through channels
like the network
X.509 standard: It is what defines the format of digital certificates, as well as a certificate
revocation list or CRL
XTACACS: It stands for Extended TACACS, which was a Cisco proprietary extension
on top of TACACS
0-Day Vulnerability (Zero Day): A vulnerability that is not known to the software
developer or vendor, but is known to an attacker
Application policies: Defines boundaries of what applications are permitted or not, but
they also help educate folks on how to use software more securely
Attack surface: It's the sum of all the different attack vectors in a given system
Bastion hosts or networks: A server used to provide access to a private network from an
external network
Binary whitelisting software: It's a list of known good and trusted software and only
things that are on the list are permitted to run
Full disk encryption (FDE): It is the practice of encrypting the entire drive in the system
Host-based firewalls: Protects individual hosts from being compromised when they're
used in untrusted and potentially malicious environments
Key escrow: Allows encryption key to be securely stored for later retrieval by an
authorized party
Normalization: It's the process of taking log data in different formats and converting it
into a standardized format that's consistent with a defined log structure
Platform key: It's the public key corresponding to the private key used to sign the boot
files
Secure boot protocol: It uses public key cryptography to secure the encrypted elements
of the boot process
Access Control Entries: The individual access permissions per object that make up the
ACL
Access Control List (ACL): It is a way of defining permissions or authorizations for
objects
Accounting: Keeping records of what resources and services your users access or what
they did when they were using your systems
Advanced Encryption Standard (AES): The first and only public cipher that's approved
for use with top secret information by the United States National Security Agency
Analyzing logs: The practice of collecting logs from different network and sometimes
client devices on your network, then performing an automated analysis on them
Asymmetric encryption: Systems where different keys are used to encrypt and decrypt
Auditing: It involves reviewing records to ensure that nothing is out of the ordinary
Authorization: It pertains to describing what the user account has access to or doesn't
have access to
Availability: Means that the information we have is readily accessible to those people
that should have it
Backdoor: A way to get into a system if the other methods to get in a system aren't
allowed, it's a secret entryway for attackers
Baiting: An attack that happens through actual physical contact, enticing a victim to do
something
Block ciphers: The cipher takes data in, places that into a bucket or block of data that's a
fixed size, then encodes that entire block as one unit
Brute force attacks: A common password attack which consists of just continuously
trying different combinations of characters and letters until one gets access
CA (Certificate authority): It's the entity that's responsible for storing, issuing, and
signing certificates. It's a crucial component of the PKI system
Caesar cipher: A substitution alphabet, where you replace characters in the alphabet
with others usually by shifting or rotating the alphabet, a set of numbers or characters
CCMP (counter mode CBC-MAC protocol): A mode of operation for block ciphers that
allows for authenticated encryption
Central repository: It is needed to securely store and index keys and a certificate
management system of some sort makes managing access to storage certificates and
issuance of certificates easier
Certificate fingerprints: These are just hash digests of the whole certificate, and aren't
actually fields in the certificate itself, but are computed by clients when validating or
inspecting certificates
Certificate Revocation List (CRL): A means to distribute a list of certificates that are no
longer valid
Certificate Revocation List (CRL): A means to distribute a list of certificates that are no
longer valid
Certificate Signature Algorithm: This field indicates what public key algorithm is used for
the public key and what hashing algorithm is used to sign the certificate
CIA Triad: Confidentiality, integrity, and availability. Three key principles of a guiding
model for designing information security policies
Client certificates: They operate very similarly to server certificates but are presented by
clients and allow servers to authenticate and verify clients
CMACs (Cipher-based Message Authentication Codes): The process is similar to HMAC,
but instead of using a hashing function to produce a digest, a symmetric cipher with a
shared keys used to encrypt the message and the resulting output is used as the MAC
Code signing certificates: It is used for signing executable programs and allows users of
these signed applications to verify the signatures and ensure that the application was
not tampered with
Correlation analysis: The process of taking log data from different systems, and
matching events across the systems
Counter-based tokens: They use a secret seed value along with the secret counter value
that's incremented every time a one-time password is generated on the device
Cross-site scripting (XSS): A type of injection attack where the attacker can insert
malicious code and target the user of the service
Cryptography: The overarching discipline that covers the practice of coding and hiding
messages from third parties
Data binding and sealing: It involves using the secret key to derive a unique key that's
then used for encryption of data
Data information tree: A structure where objects will have one parent and can have one
or more children that belong to the parent object
Decryption: The reverse process from encryption; taking the garbled output and
transforming it back into the readable plain text
Denial-of-Service (DoS) attack: An attack that tries to prevent access to a service for
legitimate users by overwhelming the network or server
Dictionary attack: A type of password attack that tries out words that are commonly
used in passwords, like password, monkey, football
Distinguished name (DN): A unique identifier for each entry in the directory
DNS Cache Poisoning Attack: It works by tricking a DNS server into accepting a fake
DNS record that will point you to a compromised DNS server
Dynamic ARP inspection (DAI): A feature on enterprise switches that prevents certain
types of attacks
ECDH & ECDSA: Elliptic curve variants of Diffie-Hellman and DSA, respectively
Eliptic curve cryptography (ECC): A public key encryption system that uses the
algebraic structure of elliptic curves over finite fields to generate secure keys
Encapsulating security payload: It's a part of the IPsec suite of protocols, which
encapsulates IP packets, providing confidentiality, integrity, and authentication of the
packets
Encryption algorithm: The underlying logic or process that's used to convert the
plaintext into ciphertext
Entropy pool: A source of random data to help seed random number generators
Evil twin: The premise of an evil twin attack is for you to connect to a network that is
identical to yours but that is controlled by an attacker. Once connected to it, they will be
able to monitor your traffic
FIPS (Federal Information Processing Standard): The DES that was adopted as a federal
standard for encrypting and securing government data
Forward secrecy: This is a property of a cryptographic system so that even in the event
that the private key is compromised, the session keys are still safe
Four-Way Handshake: It is designed to allow an AP to confirm that the client has the
correct pairwise master key in a WPA-PSK setup without disclosing the PMK
Frequency analysis: The practice of studying the frequency with which letters appear in
ciphertext
Full disk encryption (FDE): It is the practice of encrypting the entire drive in the system
GTK (Groupwise Transient Key): A temporal key, which is actually used to encrypt data
Hashing (Hash function): A type of function or operation that takes in an arbitrary data
input and maps it to an output of a fixed size, called a hash or a digest
HTTPS: Hypertext Transfer Protocol Secure is a secure version of HTTP that ensures
the communication your web browser has with the website is secured through
encryption
Hubs: Devices that serve as a central location through which data travels through; a
quick and dirty way of getting packets mirrored to your capture interface
Implicit deny: A network security concept where anything not explicitly permitted or
allowed should be denied
Injection attacks: A common security exploit that can occur in software development
and runs rampant on the web, where an attacker injects malicious code
Intermediary (subordinate) CA: It means that the entity that this certificate was issued to
can now sign other certificates
IP source guard (IPSG): It can be enabled on enterprise switches along with DHCP
snooping
IPsec (Internet Protocol security): A VPN protocol that was designed in conjunction with
IPv6
Issuer Name: This field contains information about the authority that signed the
certificate
Kerberos: A network authentication protocol that uses tickets to allow entities to prove
their identity over potentially insecure channels to provide mutual authentication
Key signing parties: Organized by people who are interested in establishing a web of
trust, and participants perform the same verification and signing
Key size: It is the total number of bits or data that comprises the encryption key
Key: A crucial component of a cipher, which introduces something unique into your
cipher
Keylogger: A common type of spyware that's used to record every keystroke you make
Logs analysis systems: They are configured using user-defined rules to match interesting
or atypical log entries
Malware: A type of malicious software that can be used to obtain your sensitive
information or delete or modify files
MD5: A popular and widely used hash function designed in the early 1990s as a
cryptographic hashing function
Meddler in the middle (formerly known as Man in the Middle): An attack that places the
attacker in the middle of two hosts that think they're communicating directly with each
other
Monitor mode: It allows to scan across channels to see all wireless traffic being sent by
APs and clients
Network software hardening: Includes things like firewalls, proxies, and VPNs
Network time protocol (NTP): A network protocol used to synchronize the time between
the authenticator token and the authentication server
OAuth: An open standard that allows users to grant third-party websites and
applications access to their information without sharing account credentials
OES (Operating Encounter Mode): It turns a block cipher into a stream cipher by using a
random seed value along with an incrementing counter to create a key stream to
encrypt data with
One-time password (OTP) tokens: Another very common method for handling multifactor
One-time password (OTP): A short-lived token, typically a number that's entered along
with a username and password
OpenID: An open standard that allows participating sites known as Relying Parties to
allow authentication of users utilizing a third party authentication service
Organizational units (OUs): Folders that let us group related objects into units like
people or groups to distinguish between individual user accounts and groups that
accounts can belong to
Packet sniffing (packet capture): the process of intercepting network packets in their
entirety for analysis
Pairwise Transient Key (PTK): It is generated using the PMK, AP nonce, Client nonce,
AP MAC address, and Client MAC address
Password attacks: Utilize software like password crackers that try and guess your
password
Password salt: Additional randomized data that's added into the hashing function to
generate the hash that's unique to the password and salt combination
PBKDF2 (Password Based Key Derivation Function 2): Password Based Key Derivation
Function 2
PGP (Pretty Good Privacy) encryption: An encryption application that allows
authentication of data along with privacy from third parties relying upon asymmetric
encryption to achieve this
Phishing attack: It usually occurs when a malicious email is sent to a victim disguised as
something legitimate
Physical tokens: They take a few different forms, such as a USB device with a secret
token on it, a standalone device which generates a token, or even a simple key used
with a traditional lock
PIN authentication method: It uses PINs that are eight-digits long, but the last digit is a
checksum that's computed from the first seven digits
Ping flood: It sends tons of ping packets to a system. If a computer can't keep up with
this, then it's prone to being overwhelmed and taken down
PKI system: A system that defines the creation, storage and distribution of digital
certificates
Port mirroring: Allows the switch to take all packets from a specified port, port range, or
the entire VLAN and mirror the packets to a specified switch port
Pre-shared key: It's the Wi-Fi password you share with people when they come over and
want to use your wireless network
Proxy: Can be useful to protect client devices and their traffic. They also provide secure
remote access without using a VPN
Public key authentication: A key pair is generated by the user who wants to authenticate
Public key signatures: Digital signature generated by composing the message and
combining it with the private key
Rainbow tables: A pre-computed table of all possible password values and their
corresponding hashes
Random numbers: A very important concept in encryption because it avoids some kind
of pattern that an adversary can discover through close observation and analysis of
encrypted messages over time
Ransomware: A type of attack that holds your data or system hostage until you pay
some sort of ransom
RC4 (Rivest Cipher 4): Asymmetric stream cipher that gained widespread adoption
because of its simplicity and speed
Remote attestation: The idea of a system authenticating its software and hardware
configuration to a remote system
Remote Authentication Dial-in User Service (RADIUS): A protocol that provides AAA
services for users on a network
Reverse proxy: A service that might appear to be a single server to external clients, but
actually represents many servers living behind it
Risk mitigation: Understanding the risks your systems face, take measures to reduce
those risks, and monitor them
Risk: The possibility of suffering a loss in the event of an attack on the system
Rogue Access Point (AP) Attack: An access point that is installed on the network without
the network administrator's knowledge
Rogue DHCP server attack: An attacker can hand out DHCP leases with whatever
information they want by deploying a rogue DHCP server on your network, setting a
gateway address or DNS server, that's actually a machine within their control
Root certificate authority: They are self signed because they are the start of the chain of
trust, so there's no higher authority that can sign on their behalf
S
Screen lock: A security feature that helps prevent unwanted access by creating an
action you have to do to gain entry
Secure element: It's a tamper resistant chip often embedded in the microprocessor or
integrated into the mainboard of a mobile device
Secure Shell (SSH): A secure network protocol that uses encryption to allow access to a
network service over unsecured networks
Security through obscurity: The principle that if no one knows what algorithm is being
used or general security practices, then one is safe from attackers
Self-signed certificate: This certificate has been signed by the same entity that issued
the certificate
Serial number: A unique identifier for their certificate assigned by the CA which allows
the CA to manage and identify individual certificates
Session key: The shared symmetric encryption key using TLS sessions to encrypt data
being sent back and forth
SHA1: It is part of the secure hash algorithm suite of functions, designed by the NSA
and published in 1995
Shannon's maxim: It states that the system should remain secure, even if your
adversary knows exactly what kind of encryption systems you're employing, as long as
your keys remain secure
Single Sign-on (SSO): An authentication concept that allows users to authenticate once
to be granted access to a lot of different services and applications
Social engineering: An attack method that relies heavily on interactions with humans
instead of computers
Spear phishing: Phishing that targets individual or group - the fake emails may contain
some personal information like your name, or the names of friends or family
SSL 3.0: The latest revision of SSL that was deprecated in 2015
SSL/TLS Client Certificate: Certificates that are bound to clients and are used to
authenticate the client to the server, allowing access control to a SSL/TLS service
SSL/TLS Server Certificate: A certificate that a web server presents to a client as part of
the initial secure setup of an SSL, TLS connection
Steganography: The practice of hiding information from observers, but not encoding it
Stream ciphers: It takes a stream of input and encrypts the stream one character or one
digit at a time, outputting one encrypted character or digit at a time
Subject Public Key Info: These two subfields define the algorithm of the public key along
with the public key itself
Subject: This field contains identifying information about the entity the certificate was
issued to
Substitution cipher: An encryption mechanism that replaces parts of your plaintext with
ciphertext
Symmetric key algorithm: Encryption algorithms that use the same key to encrypt and
decrypt messages
TACACS+: It is a device access AAA system that manages who has access to your
network devices and what they do on them
Tcpdump: It's a super popular, lightweight command-line based utility that you can use
to capture and analyze packets
Ticket granting service (TGS): It decrypts the Ticket Granting Ticket using the Ticket
Granting Service secret key, which provides the Ticket Granting Service with the client
Ticket Granting Service session key
Time-based token (TOTP): A One-Time-Password that's rotated periodically
TKIP (Temporal Key Integrity Protocol): To address the shortcomings of WEP security
TLS 1.2 with AES GCM: A specific mode of operation for the AES block cipher that
essentially turns it into a stream cipher
TPM (Trusted Platform Module): This is a hardware device that's typically integrated
into the hardware of a computer, that's a dedicated crypto processor
Transport mode: One of the two modes of operations supported by IPsec. When used,
only the payload of the IP packet is encrypted, leaving the IP headers untouched
Trojan: Malware that disguises itself as one thing but does something else
Tunnel mode: One of the two modes of operations supported by IPsec. When used, the
entire IP packet, header, payload, and all, is encrypted and encapsulated inside a new
IP packet with new headers
Tunnel: It is provided by L2TP, which permits the passing of unmodified packets from
one network to another
U2F (Universal 2nd Factor): It's a standard developed jointly by Google, Yubico and
NXP Semiconductors that incorporates a challenge-response mechanism, along with
public key cryptography to implement a more secure and more convenient second-
factor authentication solution
Validity: This field contains two subfields, Not Before and Not After, which define the
dates when the certificate is valid for
VPNs: Commonly used to provide secure remote access, and link two networks
securely
Vulnerability: A flaw in the system that could be exploited to compromise the system
WEP (Wired Equivalent Privacy): First security protocol introduced for Wi-FI networks
Wireshark: It's another packet capture and analysis tool that you can use, but it's way
more powerful when it comes to application and packet analysis, compared to tcpdump
Worms: They are similar to viruses except that instead of having to attach themselves
onto something to spread, worms can live on their own and spread through channels
like the network
WPS (Wifi Protected Setup): It's a convenience feature designed to make it easier for
clients to join a WPA-PSK protected network
X.509 standard: It is what defines the format of digital certificates, as well as a certificate
revocation list or CRL
XTACACS: It stands for Extended TACACS, which was a Cisco proprietary extension
on top of TACACS
802.1X with EAP-TLS: Offers arguably the best security available, assuming proper and
secure handling of the PKI aspects of it
Z
0-Day Vulnerability (Zero Day): A vulnerability that is not known to the software
developer or vendor, but is known to an attacker