Term
|
Definition
| Is a rule to allow traffic only when the connection between the communicating computers is secured using IPsec. |
|
|
Term
|
Definition
| The attempt of hacking a password by entering every possible combination of numbers, letters, and symbols of any length until the password is found. |
|
|
Term
|
Definition
| Is used to refer to a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong. |
|
|
Term
|
Definition
| Is a software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others. |
|
|
Term
|
Definition
| Malicious software that enters a computer system without the owner's knowledge or consent. |
|
|
Term
| Multifactor authenticated |
|
Definition
| Is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction. |
|
|
Term
| Personal Identity Verification (PIV) |
|
Definition
| Standard for smart card support |
|
|
Term
|
Definition
| Is used to decrypt a message and transform it to a readable form. |
|
|
Term
|
Definition
| A key that can be obtained and used by anyone to encrypt messages intended for a particular recipient. |
|
|
Term
|
Definition
| Specify which packets are allowed to pass through the firewall and which are blocked. |
|
|
Term
|
Definition
| Is a type of software that gathers information about computer users and transmits it back to the attacker. |
|
|
Term
|
Definition
| Are policies that define specific operating system functions. |
|
|
Term
| Windows Biometric Framework |
|
Definition
| Provides a core biometric functionality and a Biometric Device control panel for biometric authentication. |
|
|