O'Reilly logo

Inside Network Security Assessment: Guarding Your IT Infrastructure by David Kim, Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Key Terms

The following acronyms and terms are used in this chapter. For the explanation and definition purpose of this chapter, these acronyms and terms are defined as follows:

Accountability

The traceability of actions performed on a system to a specific system entity or user.

Advanced Encryption Standard (AES)

The new U.S. standard for encrypting sensitive but unclassified data. Also known as Rijndael, this symmetric encryption standard can be implemented in one of three key sizes: 128, 192, and 256 bits. It is considered a fast, simple, robust encryption mechanism.

Authentication

A method that enables you to identify someone. Authentication verifies the identity and legitimacy of the individual to access the system and its resources. Common ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required