Network security key terms


Select ten key terms from chapter 6, ten key terms from chapter 7, ten key terms from chapter 8 and ten key terms from chapter 9 and type the definitions of each. Upload into canvas.

chapter 6: 

Digital certificate

• Dual control

• End-entity certificate

Hardware security

module (HSM)

• Hierarchical trust model

• Hybrid trust model

• Key archiving

Key escrow

• Key recovery

• Local registration

authority (LRA)

chapter 7 

Certificate

Certificate Authority

(CA)

Certificate Revocation

List (CRL)

Internet Security

Association and Key

Management Protocol

(ISAKMP)

Key Terms

• IPsec

• Pretty Good Privacy

(PGP)

• Public key infrastructure

(PKI)

Secure/Multipurpose

Internet Mail Extensions

(S/MIME)

chapter 8

Access tokens

Autoplay

Biometrics

BIOS passwords

Bootdisk

• Contactless access cards

Convergence

Crossover error rate

(CER)

• Drive imaging

chapter 9

Internet Control

Message Protocol

(ICMP)

• Internet Protocol (IP)

Intranet

• Local area network

(LAN

Media Access Control

(MAC) address

• Network Address

Translation (NAT)

• Network

• Packet

• Protocol

• Ring topology