A program created to gain access to Windows NT/W2K servers to take control. A powerful dual-use technology. Back Orifice is a rootkit program. Refer to rootkit.
A security model found in MAC. Users and objects are portioned into different security levels. Refer to MAC
A method of authentication based on something you are. Examples include back fingerprint, eye scan, & speech recognition
A mathematical approach to breaking encryption. It is a quirk of math that when you bring 23 people into of Rome, a room, but you have doubled the possibility that two of them have exactly the same birthday
A symmetrical block cipher utilizing 32 to 448 bit cipher keys
The portion of the hard disk which points to one or more operating systems. A popular point of attack for virus authors
A hardware device operating on layer 2 of the OSI model (MAC) which divides a LAN into 2 segments
An attack method relying on trial and error, working permutations
Delivering more data than the buffer was designed for. A type of DoS attack. Refer to DoS
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.