Network Security and Cryptography Vocabulary

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

Comprehensive vocabulary flashcards covering network security appliances, tools, design strategy, cryptography, and social engineering based on the lecture transcript.

Last updated 4:46 AM on 5/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

40 Terms

1
New cards

Firewall

A device that blocks or passes network traffic based on a set of rules.

2
New cards

Intrusion Detection (Prevention) System (IDS/IPS)

A device that scans network traffic and creates an alert if suspicious activity is identified.

3
New cards

Proxy Server

A device that makes a request on behalf of another device.

4
New cards

Virtual Private Network (VPN)

A system that encrypts traffic in order to “Tunnel” across another network.

5
New cards

Packet Filters

A type of firewall that operates at the Delivery and Transport Layer to get rid of obvious traffic first with high efficiency.

6
New cards

Circuit level Gateways

Firewalls that provide session protection and enhanced NAT.

7
New cards

Application Level firewalls

Layer 7 firewalls that are computationally expensive and use pattern matching and context.

8
New cards

Stateful multilayer inspection firewalls

Firewalls that use a combination of packet filtering, circuit level gateways, and application level methods.

9
New cards

Signature Recognition

An IDS method that looks for recognizable characteristics and requires regular updates.

10
New cards

Anomaly Detection

An IDS method that identifies abnormal behavior, such as excessive activity, by knowing what normal looks like.

11
New cards

Statistical Detection

An IDS method that detects attacks taking place over a long period of time.

12
New cards

Host-based IDS (HIDS)

An active IDS that blocks traffic, notifies the user, and may monitor log files or file integrity.

13
New cards

File integrity checking

The use of System Integrity Verifiers to check files against hashes to detect unauthorized changes.

14
New cards

Squid Proxy Server

An internet proxy server and cache service used to increase network speed and provide anonymity.

15
New cards

Access Control Lists (OS Based)

File and service permissions, such as Linux rwxrwxrwx and Windows Read/Write/Modify, that define user actions.

16
New cards

Access Control Lists (Network Devices Based)

A white or black list, such as MAC address whitelists or web blacklists, that controls device attachment to a network.

17
New cards

Vulnerability Scanner

A software package, such as nMap or Nessus, that scans computers and networks for known vulnerabilities and outdated software.

18
New cards

Incident Response

The process of identifying, isolating, and investigating a security event.

19
New cards

Disaster Recovery

Activities involving disaster avoidance and restoring full functionality after an event.

20
New cards

Network Forensics

The investigation of network data to determine who, what, when, where, why, and how an event occurred.

21
New cards

Password Hardness Formula

The calculation where hardness HH is related to the character set CC and length LL, expressed as H ext{ is } inom{Brute}{Force} ext{ based on } C^L.

22
New cards

Cryptography

Derived from the term "hidden writing," it is the use of secret keys to encode and decode messages.

23
New cards

Caesar Cipher

A classic encryption method using a shift of 3 (e.g., Caesar becomes Fdhvdu).

24
New cards

PAIN

An acronym for the four core goals of cryptography: Privacy, Authentication, Integrity, and Non-repudiation.

25
New cards

Symmetric Encryption

An algorithm class where the same secret key is used for both encryption and decryption.

26
New cards

Asymmetric Encryption

An algorithm class using a public/private key pair to solve key sharing and non-repudiation problems.

27
New cards

Hashing Algorithms

One-way algorithms used to ensure message integrity; common examples include MD5.

28
New cards

Frequency Analysis

A method used to attack substitution ciphers by analyzing the commonality of characters like the letter E.

29
New cards

Transposition Cipher

An encryption method that changes the position of characters rather than substituting them.

30
New cards

Stream Ciphers

A type of symmetric encryption that often utilizes XOR operations on a flow of data.

31
New cards

Block Ciphers

Symmetric encryption that rearranges subkeys and processes data in fixed-size blocks.

32
New cards

Digital Signatures

A hash that has been encrypted with the sender’s private key to provide authentication and non-repudiation.

33
New cards

Cryptosystems

Systems that use all three classes of algorithms (Symmetric, Asymmetric, and Hashing) to ensure PAIN.

34
New cards

Social Engineering

Often called "People Hacking," it is the act of exploiting the human element to compromise a network.

35
New cards

Reverse Social Engineering

Getting a target to seek the attacker out through sabotage, advertising, or assisting while gathering info.

36
New cards

Spear Phishing

A targeted form of phishing, also known as web phishing.

37
New cards

419 Scams

A specific type of phishing scam also known as Nigerian Prince scams.

38
New cards

Obfuscation

The act of obscuring information, such as using Tiny URLs (bit.ly) to mask a link's true destination.

39
New cards

Dumpster diving

A physical control breach involving searching through trash to find sensitive information.

40
New cards

Piggy-backing and Tail-gaiting

Physical security breaches where an unauthorized person follows an authorized person into a restricted area.