1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
IAM (Identity Access Managment)
Comprehensive security framework that manages the entire lifecycle of a digital identity (such as a user account or device) and controls how it can access organizational resources
DLP (Data Loss Prevention)
Dedicated software or hardware-based security designed to detect and prevent unauthorized use and transmission of confidential information
SAML (Security Assertions Markup Language)
A standardized way to tell external applications and services that a user is who they say they are.
Makes single sign-on (SSO) technology possible by providing a way to authenticate a user once and then communicate that authentication to multiple applications.
LDAP (Lightweight Directory Access Protocol)
A protocol that makes it possible for applications to query user information rapidly.
HCL (Hardware Compatability List)
A catalog of tested devices and drivers
RADIUS (Remote Authentication Dial-In User Service)
A networking protocol that authorizes and authenticates users who access a remote network
TACACS+ (Terminal Access Controller Access Control System)
A security protocol developed by Cisco to provide centralized authentication, authorization, and accounting (AAA) for users accessing network devices
Kerberos
Authentication protocol used in Windows to authenticate users in Active Directory
TKIP (Temporarl Key Integrity Protocol)
A security protocol used in the IEEE 802.11 wireless networking
AES (Advanced Encryption Standard)
A highly trusted encryption algorithm used to secure data by converting it into an unreadable format without the proper key
PUP (Potentially Unwanted Program)
Software installed without clear user consent, often bundled with legitimate free programs
Typically display excessive ads (adware), hijack browsers, slow down systems, or track user activity
EDR (Endpoint Detection and Response)
A security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber threats at the device level
MDR (Managed Detection and Response)
A dedicated cybersecurity service that offers continuous monitoring, threat detection, and incident response typically delivered by an external provider
XDR (Extended Detection and Response)
A unified cybersecurity approach that collects and correlates data across multiple security layers (such as endpoint, network, and cloud) for enhanced threat detection and response