CISSP CBK Glossary Flashcards
(452 cards)
6to4
Transition mechanism for migrating from IPv4 to IPv6. It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network.
A Checklist Test
Copies of the plan are handed out to each functional area for examination to ensure the plan properly deals with the area’s needs and vulnerabilities.
A Cold Site
Is just a building with power, raised floors, and utilities. No devices are available. This is the cheapest of the three options, but can take weeks to get up and operational.
A Full-Interruption Test
One in which regular operations are stopped and processing is moved to the alternate site.
A Hot Site
Fully configured with hardware, software, and environmental needs. It can usually be up and running in a matter of hours. It is the most expensive option, but some companies cannot be out of business longer than a day without very detrimental results.
A Parallel Test
One in which some systems are actually run at the alternate site.
A Reciprocal Agreement
One in which a company promises another company it can move in and share space if it experiences a disaster, and vice versa. Reciprocal agreements are very tricky to implement and are unenforceable.
A Simulation Test
A practice execution of the plan takes place. A specific scenario is established, and the simulation continues up to the point of actual relocation to the alternate site.
A Structured Walk-Through Test
Representatives from each functional area or department get together and walk through the plan from beginning to end.
A Warm Site
Does not have computers, but it does have some peripheral devices, such as disk drives, controllers, and tape drives. This option is less expensive than a hot site, but takes more effort and time to become operational.
Absolute Addresses
Hardware addresses used by the CPU.
Abstraction
The capability to suppress unnecessary details so the important, inherent properties can be examined and reviewed.
Accepted Ways for Handling Risk
Accept, transfer, mitigate, avoid.
Access
The flow of information between a subject and an object.
Access Control Matrix
A table of subjects and objects indicating what actions individual subjects can take upon individual objects.
Access Control Model
An access control model is a framework that dictates how subjects access objects.
Access Controls
Are security features that control how users and systems communicate and interact with other systems and resources.
Accreditation
Formal acceptance of the adequacy of a system’s overall security by management.
Active Attack
Attack where the attacker does interact with processing or communication activities.
ActiveX
A Microsoft technology composed of a set of OOP technologies and tools based on COM and DCOM. It is a framework for defining reusable software components in a programming language independent manner.
Address Bus
Physical connections between processing components and memory segments used to communicate the physical memory addresses being used during processing procedures.
Address Resolution Protocol (ARP)
A networking protocol used for resolution of network layer IP addresses into link layer MAC addresses.
Address Space Layout Randomization (ASLR)
Memory protection mechanism used by some operating systems. The addresses used by components of a process are randomized so that it is harder for an attacker to exploit specific memory vulnerabilities.
Algebraic Attack
Cryptanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions.