(Page 2 of 2)
The process of analyzing functions
of an existing objects and improves or duplicates the process
Canceling credentials. Refer to CRL
The process of determining security
costs compared to threats
Provides access to a computer system
via a 'back door'.
A device that connects X number of
LANs using the network layer (layer 3) data. Unlike a bridge which is
limited to 2 LANs
RSA (Rivest Shamir Adleman)
Creators of the RC block ciphers
RSBAC (Rule Set Based Access Control)
Allows MAC implementation on Linux.
Refer to MAC.
|If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!|
Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.