O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

In this chapter, we covered many concepts that will take you through the rest of the book. By covering general concepts of computer security, we have given you a foundation upon which you can build a more detailed understanding of security and its many facets.

KEY TERMS

  • Accounting

  • Auditing

  • Authentication

  • Authorization

  • Back door

  • Biometrics

  • Certificate

  • Certificate authority

  • CHAP

  • Denial of service and distributed denial of service (DoS/DDoS)

  • Discretionary access control (DAC)

  • Kerberos

  • Logic bomb

  • Mandatory access control (MAC)

  • Man-in-the-middle

  • Multifactor authentication

  • Mutual authentication

  • Replay

  • Role-based access control (RBAC)

  • Social engineering

  • Spoofing

  • TCP/IP hijacking

  • Token

  • Trojan horse

  • Virus

  • Worm

In the first section, you learned basic terminology. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required