CISSP CBK Glossary Flashcards

(452 cards)

1
Q

6to4

A

Transition mechanism for migrating from IPv4 to IPv6. It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Checklist Test

A

Copies of the plan are handed out to each functional area for examination to ensure the plan properly deals with the area’s needs and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Cold Site

A

Is just a building with power, raised floors, and utilities. No devices are available. This is the cheapest of the three options, but can take weeks to get up and operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Full-Interruption Test

A

One in which regular operations are stopped and processing is moved to the alternate site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Hot Site

A

Fully configured with hardware, software, and environmental needs. It can usually be up and running in a matter of hours. It is the most expensive option, but some companies cannot be out of business longer than a day without very detrimental results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Parallel Test

A

One in which some systems are actually run at the alternate site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Reciprocal Agreement

A

One in which a company promises another company it can move in and share space if it experiences a disaster, and vice versa. Reciprocal agreements are very tricky to implement and are unenforceable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Simulation Test

A

A practice execution of the plan takes place. A specific scenario is established, and the simulation continues up to the point of actual relocation to the alternate site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Structured Walk-Through Test

A

Representatives from each functional area or department get together and walk through the plan from beginning to end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Warm Site

A

Does not have computers, but it does have some peripheral devices, such as disk drives, controllers, and tape drives. This option is less expensive than a hot site, but takes more effort and time to become operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Absolute Addresses

A

Hardware addresses used by the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Abstraction

A

The capability to suppress unnecessary details so the important, inherent properties can be examined and reviewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accepted Ways for Handling Risk

A

Accept, transfer, mitigate, avoid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access

A

The flow of information between a subject and an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access Control Matrix

A

A table of subjects and objects indicating what actions individual subjects can take upon individual objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access Control Model

A

An access control model is a framework that dictates how subjects access objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access Controls

A

Are security features that control how users and systems communicate and interact with other systems and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Accreditation

A

Formal acceptance of the adequacy of a system’s overall security by management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Active Attack

A

Attack where the attacker does interact with processing or communication activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ActiveX

A

A Microsoft technology composed of a set of OOP technologies and tools based on COM and DCOM. It is a framework for defining reusable software components in a programming language independent manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Address Bus

A

Physical connections between processing components and memory segments used to communicate the physical memory addresses being used during processing procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Address Resolution Protocol (ARP)

A

A networking protocol used for resolution of network layer IP addresses into link layer MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Address Space Layout Randomization (ASLR)

A

Memory protection mechanism used by some operating systems. The addresses used by components of a process are randomized so that it is harder for an attacker to exploit specific memory vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Algebraic Attack

A

Cryptanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Algorithm
Set of mathematical and logic rules used in cryptographic functions.
26
Analog Signals
Continuously varying electromagnetic wave that represents and transmits data.
27
Analytic Attack
Cryptanalysis attack that exploits vulnerabilities within the algorithm structure.
28
Annualized Loss Expectancy (ALE)
Annual expected loss if a specific vulnerability is exploited and how it affects a single asset. SLE * ARO = ALE.
29
Application Programming Interface (API)
Software interface that enables process-to-process interaction. Common way to provide access to standard routines to a set of software programs.
30
Arithmetic Logic Unit (ALU)
A component of the computer's processing unit, in which arithmetic and matching operations are performed.
31
AS/NZS 4360
Australia and New Zealand business risk management assessment approach.
32
Assemblers
Tools that convert assembly code into the necessary machine-compatible binary language for processing activities to take place.
33
Assembly Language
A low-level programming language that is the mnemonic representation of machine-level instructions.
34
Assurance Evaluation Criteria
Check-list and process of examining the security-relevant parts of a system (TCB, reference monitor, security kernel) and assigning the system an assurance rating.
35
Asymmetric Algorithm
Encryption method that uses two different key types, public and private. Also called public key cryptography.
36
Asymmetric Mode Multiprocessing
When a computer has two or more CPUs and one CPU is dedicated to a specific program while the other CPUs carry out general processing procedures.
37
Asynchronous Communication
Transmission sequencing technology that uses start and stop bits or similar encoding mechanism. Used in environments that transmit a variable amount of data in a periodic fashion.
38
Asynchronous Token Generating Method
Employs a challenge/response scheme to authenticate the user.
39
Attack Surface
Components available to be used by an attacker against the product itself.
40
Attenuation
Gradual loss in intensity of any kind of flux through a medium. As an electrical signal travels down a cable, the signal can degrade and distort or corrupt the data it is carrying.
41
Attribute
A column in a two-dimensional database.
42
Authentication Header (AH) Protocol
Protocol within the IPSec suite used for integrity and authentication.
43
Authenticode
A type of code signing, which is the process of digitally signing software components and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was digitally signed. Authenticode is Microsoft's implementation of code signing.
44
Availability
Reliable and timely access to data and resources is provided to authorized individuals.
45
Avalanche effect
Algorithm design requirement so that slight changes to the input result in drastic changes to the output.
46
Base registers
Beginning of address space assigned to a process. Used to ensure a process does not make a request outside its assigned memory boundaries.
47
Baseband transmission
Uses the full bandwidth for only one communication channel and has a low data transfer rate compared to broadband.
48
Bastion host
A highly exposed device that will most likely be targeted for attacks, and thus should be hardened.
49
Behavior blocking
Allowing the suspicious code to execute within the operating system and watches its interactions with the operating system, looking for suspicious activities.
50
Birthday attack
Cryptographic attack that exploits the mathematics behind the birthday problem in the probability theory forces collisions within hashing functions.
51
Block cipher
Symmetric algorithm type that encrypts chunks (blocks) of data at a time.
52
Blowfish
Block symmetric cipher that uses 64-bit block sizes and variable-length keys.
53
Border Gateway Protocol (BGP)
The protocol that carries out core routing decisions on the Internet. It maintains a table of IP networks, or "prefixes," which designate network reachability among autonomous systems.
54
Bots
Software applications that run automated tasks over the Internet, which perform tasks that are both simple and structurally repetitive. Malicious use of bots is the coordination and operation of an automated attack by a botnet (centrally controlled collection of bots).
55
Broadband transmission
Divides the bandwidth of a communication channel into many channels, enabling different types of data to be transmitted at one time.
56
Buffer overflow
Too much data is put into the buffers that make up a stack. Common attack vector used by attackers to run malicious code on a target system.
57
Bus topology
Systems are connected to a single transmission channel (i.e., network cable), forming a linear construct.
58
Business Continuity Management (BCM)
is the overarching approach to managing all aspects of BCP and DRP.
59
Business Continuity Plan (BCP)
A business continuity action plan is a document or set of documents that contains the critical information a business needs to stay running in spite of adverse events. A business continuity plan is also called an emergency plan.
60
Business Impact Analysis (BIA)
An exercise that determines the impact of losing the support of any resource to an organization, establishes the escalation of that loss over time, identifies the minimum resources needed to recover, and prioritizes the recovery of processes and supporting systems.
61
Cable Modem
A device that provides bidirectional data communication via radio frequency channels on cable TV infrastructures. Cable modems are primarily used to deliver broadband Internet access to homes.
62
Cache memory
Fast memory type that is used by a CPU to increase read and write operations.
63
Caesar Cipher
Simple substitution algorithm created by Julius Caesar that shifts alphabetic values three positions during its encryption and decryption processes
64
Capability Maturity Model Integration (CMMI)
A process improvement methodology that provides guidance for quality improvement and point of reference for appraising existing processes developed by Carnegie Mellon.
65
Capability Table
A capability table specifies the access rights a certain subject possesses pertaining to specific objects. A capability table is different from an ACL because the subject is bound to the capability table, whereas the object is bound to the ACL.
66
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
LANs using carrier sense multiple access with collision avoidance require devices to announce their intention to transmit by broadcasting a jamming signal.
67
CBC-MAC
Cipher block chaining message authentication code uses encryption for data integrity and data origin authentication.
68
Cell
An intersection of a row and a column.
69
Cell suppression
A technique used to hide specific cells that contain sensitive information.
70
Central Processing Unit (CPU)
The part of a computer that performs the logic, computation, and decision-making functions. It interprets and executes instructions as it receives them.
71
Certificate
Digital identity used within a PKI. Generated and maintained by a certificate authority and used for authentication.
72
Certificate Revocation List (CRL)
List that is maintained by the certificate authority of a PKI that contains information on all of the digital certificates that have been revoked.
73
Certification
Technical evaluation of the security components and their compliance to a predefined security policy for the purpose of accreditation.
74
Certification Authority
Component of a PKI that creates and maintains digital certificates throughout their life cycles.
75
Change control
The process of controlling the changes that take place during the life cycle of a system and documenting the necessary change control activities.
76
Channel Service Unit (CSU)
A line bridging device for use with T-carriers, and that is required by PSTN providers at digital interfaces that terminate in a Data Service Unit (DSU) on the customer side. The DSU is a piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment.
77
Chosen-ciphertext attack
Cryptanalysis attack where the attacker chooses a ciphertext and obtains its decryption under an unknown key.
78
Chosen-plaintext attack
Cryptanalysis attack where the attacker can choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts.
79
Cipher
Another name for algorithm.
80
Ciphertext-only attack
Cryptanalysis attack where the attacker is assumed to have access only to a set of ciphertexts.
81
Classless Interdomain Routing (CIDR)
A method for using the existing 32-bit Internet Address Space efficiently.
82
Client-side validation
Input validation is done at the client before it is even sent back to the server to process.
83
Clipping Level
A threshold.
84
Closed system
Designs are built upon proprietary procedures, which inhibit interoperability capabilities.
85
Cloud computing
The delivery of computer processing capabilities as a service rather than as a product, whereby shared resources, software, and information are provided to end users as a utility. Offerings are usually bundled as an infrastructure, platform, or software.
86
CMAC
Cipher message authentication code that is based upon and provides more security compared to CBC-MAC.
87
CCM
Block cipher mode that combines the CTR encryption mode and CBC-MAC. One encryption key is used for both authentication and encryption purposes.
88
CobiT
Set of control objectives used as a framework for IT governance developed by Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI).
89
Cognitive passwords
Fact or opinion based information used to verify an individual's identity.
90
Cohesion
A measurement that indicates how many different types of tasks a module needs to carry out.
91
Collision
(1) A condition that is present when two or more terminals are in contention during simultaneous network access attempts. (2) In cryptography, an instance when a hash function generates the same output for different inputs.
92
Collusion
Two or more people working together to carry out fraudulent activities.
93
Common Criteria
International standard used to assess the effectiveness of the security controls built into a system from functional and assurance perspectives.
94
Compilers
Tools that convert high-level language statements into the necessary machine-level format (.exe, .dll, etc.) for specific processors to understand.
95
Compression viruses
Another type of virus that appends itself to executables on the system and compresses them by using the user's permissions.
96
Concealment Cipher
Encryption method that hides a secret message within an open message.
97
Confidentiality
A security concept that assures the necessary level of secrecy is enforced and unauthorized disclosure is prevented.
98
Confusion
Substitution processes used in encryption functions to increase randomness.
99
Content-based access
Bases access decisions on the sensitivity of the data, not solely on subject identity.
100
Context-based access
Bases access decisions on the state of the situation, not solely on identity or content sensitivity.
101
Control
Safeguard that is put in place to reduce a risk, also called a countermeasure.
102
Control functions (Functions of controls)
Deterrent: Discourage a potential attacker Preventive: Stop an incident from occurring Corrective: Fix items after an incident has occurred Recovery: Restore necessary components to return to normal operations Detective: Identify an incident's activities after it took place Compensating: Alternative control that provides similar protection as the original control
103
Control types
Administrative, technical (logical), and physical
104
Control unit
Part of the CPU that oversees the collection of instructions and data from memory and how they are passed to the processing components of the CPU.
105
Cookies
Data files used by web browsers and servers to keep browser state information and browsing preferences.
106
Cooperative multitasking
Multitasking scheduling scheme used by older operating systems to allow for computer resource time slicing.
107
Copyright
A form of protection granted by law for original works of authorship fixed in a tangible medium of expression.
108
COSO
Internal control model used for corporate governance to help prevent fraud developed by the Committee of Sponsoring Organizations (COSO) of the Treadway Commission.
109
Cost/benefit analysis
An estimate of the equivalent monetary value of proposed benefits and the estimated costs associated with a control in order to establish whether the control is feasible.
110
Coupling
A measurement that indicates how much interaction one module requires for carrying out its tasks.
111
CRAMM
Central Computing and Telecommunications Agency Risk Analysis and Management Method.
112
Cross-Site Scripting (XSS) attack
An attack where a vulnerability is found on a web site that allows an attacker to inject malicious code into a web application.
113
Crosstalk
A signal on one channel of a transmission creates an undesired effect in another channel by interacting with it. The signal from one cable "spills over" into another cable.
114
Cryptanalysis
Practice of uncovering flaws within cryptosystems.
115
Cryptography
Science of secret writing that enables an entity to store and transmit data in a form that is available only to the intended individuals.
116
Cryptology
The study of both cryptography and cryptanalysis.
117
Cryptosystem
Hardware or software implementation of cryptography that contains all the necessary software, protocols, algorithms, and keys.
118
Data bus
Physical connections between processing components and memory segments used to transmit data being used during processing procedures.
119
Data custodian
Individual responsible for implementing and maintaining security controls to meet security requirements outlined by data owner.
120
Data dictionary
Central repository of data elements and their relationships.
121
Data diddling
The act of willfully modifying information, programs, or documentation in an effort to commit fraud or disrupt production.
122
Data Execution Prevention (DEP)
Memory protection mechanism used by some operating systems. Memory segments may be marked as non-executable so that they cannot be misused by malicious software.
123
Data hiding
Use of segregation in design decisions to protect software components from negatively interacting with each other. Commonly enforced through strict interfaces.
124
Data mining
A methodology used by organizations to better understand their customers, products, markets, or any other phase of the business.
125
Data modeling
Considers data independently of the way the data are processed and of the components that process the data. A process used to define and analyze data requirements needed to support the business processes.
126
Data owner
Individual responsible for the protection and classification of a specific data set.
127
Data structure
A representation of the logical relationship between elements of data.
128
Data warehousing
Combines data from multiple databases or data sources into a large database for the purpose of providing more extensive information retrieval and data analysis.
129
Database
A cross-referenced collection of data.
130
Database Management System (DBMS)
Manages and controls the database.
131
Decipher
Act of transforming data into a readable format.
132
Defense-in-depth
Implementation of multiple controls so that successful penetration and compromise is more difficult to attain.
133
Delphi method
Data collection method that happens in an anonymous fashion.
134
Differential cryptanalysis
Cryptanalysis method that uses the study of how differences in an input can affect the resultant difference at the output.
135
Diffie-Hellman algorithm
First asymmetric algorithm created and is used to exchange symmetric key values. Based upon logarithms in finite fields.
136
Diffusion
Transposition processes used in encryption functions to increase randomness.
137
Digital Rights Management (DRM)
Access control technologies commonly used to protect copyright material.
138
Digital signals
Binary digits are represented and transmitted as discrete electrical pulses.
139
Digital signature
Ensuring the authenticity and integrity of a message through the use of hashing algorithms and asymmetric algorithms. The message digest is encrypted with the sender's private key.
140
Digital Subscriber Line (DSL)
A set of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network. DSL is used to digitize the "last mile" and provide fast Internet connectivity.
141
Distance-Vector routing protocol
A routing protocol that calculates paths based on the distance (or number of hops) and a vector (a direction).
142
DNS zone transfer
The process of replicating the databases containing the DNS data across a set of DNS servers.
143
DNSSEC
A set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.
144
DoDAF
U.S. Department of Defense architecture framework that ensures interoperability of systems to meet military mission goals.
145
Domain Name System (DNS)
A hierarchical distributed naming system for computers, services, or any resource connected to an IP based network. It associates various pieces of information with domain names assigned to each of the participating entities.
146
Dual-homed firewall
This device has two interfaces and sits between an untrusted network and trusted network to provide secure access.
147
Dumpster diving
Refers to going through someone's trash to find confidential or useful information. It is legal, unless it involves trespassing, but in all cases it is considered unethical.
148
Dynamic Host Configuration Protocol (DHCP)
DHCP is an industry standard protocol used to dynamically assign IP addresses to network devices.
149
Dynamic link libraries (DLLs)
A set of subroutines that are shared by different applications and operating system processes.
150
El Gamal algorithm
Asymmetric algorithm based upon the Diffie-Hellman algorithm used for digital signatures, encryption, and key exchange.
151
Elliptic curve cryptosystem algorithm
Asymmetric algorithm based upon the algebraic structure of elliptic curves over finite fields. Used for digital signatures, encryption, and key exchange.
152
E-mail spoofing
Activity in which the sender address and other arts of the e-mail header are altered to appear as though the e-mail originated from a different source. Since SMTP does not provide any authentication, it is easy to impersonate and forge e-mails.
153
Encapsulating Security Payload Protocol (ESP)
Protocol within the IPSec suite used for integrity, authentication, and encryption.
154
Encipher
Act of transforming data into an unreadable format.
155
End-to-End encryption
The encryption of information at the point of origin within the communications network and postponing of decryption to the final destination point.
156
Ethernet
Common LAN media access technology standardized by IEEE 802.3. Uses 48-bit MAC addressing, works in contention-based networks, and has extended outside of just LAN environments.
157
Exposure
Presence of a vulnerability, which exposes the organization to a threat.
158
Facilitated Risk Analysis Process (FRAP)
A focused, qualitative approach that carries out pre-screening to save time and money.
159
Failure Modes and Effect Analysis (FMEA)
Approach that dissects a component into its basic functions to identify flaws and those flaw's effects.
160
Fault tree analysis
Approach to map specific flaws to root causes in complex systems.
161
Federated identity
A portable identity, and its associated entitlements, that can be used across business boundaries.
162
Fiber Distributed Data Interface (FDDI)
Ring-based token network protocol that was derived from the IEEE 802.4 token bus timed token protocol. It can work in LAN or MAN environments and provides fault tolerance through dual-ring architecture.
163
File
A basic unit of data records organized on a storage medium for convenient location, access, and updating.
164
Foreign key
An attribute of one table that is related to the primary key of another table.
165
Fraggle attack
A DDoS attack type on a computer that floods the target system with a large amount of UDP echo traffic to IP broadcast addresses.
166
Frequency analysis
Cryptanalysis process used to identify weaknesses within cryptosystems by locating patterns in resulting ciphertext.
167
Frequency-Division Multiplexing (FDM)
An older technique in which the available transmission bandwidth of a circuit is divided by frequency into narrow bands, each used for a separate voice or data transmission channel, which many conversations can be carried on one circuit.
168
Functionality versus Effectiveness of Control
Functionality is what a control does, and its effectiveness is how well the control does it.
169
Fuzzing
A technique used to discover flaws and vulnerabilities in software.
170
Garbage collector
Tool that marks unused memory segments as usable to ensure that an operating system does not run out of memory.
171
General registers
Temporary memory location the CPU uses during its processes of executing instructions. The ALU's "scratch pad" it uses while carrying out logic and math functions.
172
Guideline
Suggestions and best practices.
173
H.323
A standard that addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multipoint conferences.
174
Hardware segmentation
Physically mapping software to individual memory segments.
175
Hashed Message Authentication Code (HMAC)
Cryptographic hash function that uses a symmetric key value and is used for data integrity and data origin authentication.
176
Hierarchical data model
Combines records and fields that are related in a logical tree structure.
177
High Availability
Refers to a system, component, or environment that is continuously operational.
178
High-Level languages
Otherwise known as third-generation programming languages, due to their refined programming structures, using abstract statements.
179
Honeypots
Systems that entice with the goal of protecting critical production systems. If two or more honeypots are used together, this is considered a honeynet.
180
HTTPS
A combination of HTTP and SSL\TLS that is commonly used for secure Internet connections and e-commerce transactions.
181
Hybrid cryptography
Combined use of symmetric and asymmetric algorithms where the symmetric key encrypts data and an asymmetric key encrypts the symmetric key.
182
Hybrid Microkernel architecture
Combination of monolithic and microkernel architectures. The microkernel carries out critical operating system functionality, and the remaining functionality is carried out in a client\server model within kernel mode.
183
Hypervisor
Central program used to manage virtual machines (guests) within a simulated environment (host).
184
IEEE 802.1AE (MACSec)
Standard that specifies a set of protocols to meet the security requirements for protecting data traversing Ethernet LANs.
185
IEEE 802.1AR
Standard that specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device (router, switch, access point) to its identifiers.
186
Immunizer
Attaches code to the file or application, which would fool a virus into "thinking" it was already infected.
187
Information gathering
Usually the first step in an attacker's methodology, in which the information gathered may allow an attacker to infer additional information that can be used to compromise systems.
188
Information Technology Security Evaluation Criteria (ITSEC)
European standard used to assess the effectiveness of the security controls built into a system.
189
Initialization vectors (IVs)
Values that are used with algorithms to increase randomness for cryptographic functions.
190
Instruction set
Set of operations and commands that can be implemented by a particular processor (CPU).
191
Integrated Services Digital Network (ISDN)
A circuit-switched telephone network system technology designed to allow digital transmission of voice and data over ordinary telephone copper wires.
192
Integrity
Accuracy and reliability of the information and systems are provided and any unauthorized modification is prevented.
193
International Data Encryption Algorithm (IDEA)
Block symmetric cipher that uses a 128-bit key and 64-bit block size.
194
Internet Control Message Protocol (ICMP)
A core protocol of the IP suite used to send status and error messages.
195
Internet Group Management Protocol (IGMP)
Used by systems and adjacent routers on IP networks to establish and maintain multicast group memberships.
196
Internet Message Access Protocol (IMAP)
A method of accessing electronic mail or bulletin board messages that are kept on a (possibly shared) mail server. IMAP permits a client e-mail program to access remote message stores as if they were local. For example, e-mail stored on an IMAP server can be manipulated from a desktop computer at home, a workstation at the office, and a notebook computer while traveling, without the need to transfer messages of files back and forth between these computers. IMAP can be regarded as the next-generation POP.
197
Internet Protocol (IP)
Core protocol of the TCP/IP suite. Provides packet construction, addressing, and routing functionality.
198
Internet Security Association and Key Management Protocol (ISAKMP)
Used to establish security associates and an authentication framework in Internet connections. Commonly used by IKE for key exchange.
199
Interpreters
Tools that convert code written in interpreted languages to the machine-level format for processing.
200
Interrupt
Software or hardware signal that indicates that system resources (i.e., CPU) are needed for instruction processing.
201
Interrupts
Values assigned to computer components (hardware and software) to allow for efficient computer resource time slicing.
202
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
An IPv6 transition mechanism meant to transmit IPv6 packets between dual-stack nodes on top of an IPv4 network.
203
IPSec
Protocol suite used to protect IP traffic through encryption and authentication. De facto standard VPN protocol.
204
IPv6
IP version 6 is the successor to IP version 4 and provides 128-bit addressing, integrated IPSec security protocol, simplified header formats, and some automated configuration.
205
ISO/IEC 27000 series
Industry-recognized best practices for the development and management of an information security management system.
206
ISO/IEC 27005
International standard for the implementation of a risk management program that integrates into an information security management system (ISMS).
207
ITIL
Best practices for information technology services management processes developed by the United Kingdom's Office of Government Commerce.
208
Java applets
Small components (applets) that provide various functionalities and are delivered to users in the form of Java bytecode. Java applets can run in a web browser using a Java Virtual Machine (JVM). Java is platform independent; thus, Java applets can be executed by browsers for many platforms.
209
Kerckhoffs' Principle
Concept that an algorithm should be known and only the keys should be kept secret.
210
Kernel mode (supervisory state, privilege mode)
Mode that a CPU works within when carrying out more trusted process instructions. The process has access to more computer resources when working in kernel versus user mode.
211
Key
Sequence of bits that are used as instructions that govern the acts of cryptographic functions within an algorithm.
212
Key clustering
A weakness that would exist in a cryptosystem if two different keys would generate the same ciphertext from the same plaintext.
213
Key Derivation Functions (KDFs)
Generation of secret keys (subkeys) from an initial value (master key).
214
Keyspace
A range of possible values used to construct keys.
215
Keystream generator
Component of a stream algorithm that creates random values for encryption purposes.
216
Known-plaintext attack
Cryptanalysis attack where the attacker is assumed to have access to sets of corresponding plaintext and ciphertext.
217
Layered operating system architecture
Architecture that separates system functionality into hierarchical layers.
218
Limit registers
Ending of address space assigned to a process. Used to ensure a process does not make a request outside its assigned memory boundaries.
219
Linear cryptanalysis
Cryptanalysis method that uses the study of affine transformation approximation in encryption processes.
220
Link encryption
Technology that encrypts full packets (all headers and data payload) and is carried out without the sender's interaction.
221
Link-state routing protocol
A routing protocol used in packet-switching networks where each router constructs a map of the connectivity within the network and calculates the best logical paths, which form its routing table.
222
Logic bomb
Executes a program, or string of code, when a certain event happens or a date and time arrives.
223
Logical addresses
Indirect addressing used by processes within an operating system. The memory manager carries out logical-to-absolute address mapping.
224
Machine language
A set of instructions in binary format that the computer's processor can understand and work with directly.
225
Macro virus
A computer virus that spreads by binding itself to software such as Word or Excel.
226
Maintenance hooks
Code within software that provides a back door entry capability.
227
Mandatory vacation
Detective administrative control used to uncover potential fraudulent activities by requiring a person to be away from the organization for a period of time.
228
Maskable interrupt
Interrupt value assigned to a non-critical operating system activity.
229
Mean Time Between Failures (MTBF)
The predicted amount of time between inherent failures of a system during operation.
230
Mean Time To Repair (MTTR)
A measurement of the maintainability by representing the average time required to repair a failed component or device.
231
Media access control (MAC)
Data communication protocol sub-layer of the data link layer specified in the OSI model. It provides hardware addressing and channel access control mechanisms that make it possible for several nodes to communicate within a multiple-access network that incorporates a shared medium.
232
Meet-in-the-middle attack
Cryptanalysis attack that tries to uncover a mathematical problem from two different ends.
233
Meme viruses
These are not actual computer viruses, but types of e-mail messages that are continually forwarded around the Internet.
234
Memory card
Holds information but cannot process information.
235
Mesh topology
Network where each system must not only capture and disseminate its own data, but also serve as a relay for other systems; that is, it must collaborate to propagate the data in the network.
236
Message authentication code (MAC)
Keyed cryptographic hash function used for data integrity and data origin authentication.
237
Metro Ethernet
A data link technology that is used as a metropolitan area network to connect customer networks to larger service networks or the Internet.
238
Metropolitan area network (MAN)
A data network intended to serve an area approximating that of a large city or college campus. Such networks are being implemented by innovative techniques, such as running fiber cables through subway tunnels.
239
Microarchitecture
Specific design of a microprocessor, which includes physical components (registers, logic gates, ALU, cache, etc.) that support a specific instruction set.
240
Microkernel architecture
Reduced amount of code running in kernel mode carrying out critical operating system functionality. Only the absolutely necessary code runs in kernel mode, and the remaining operating system code runs in user mode.
241
Mobile code
Code that can be transmitted across a network, to be executed by a system or device on the other end.
242
MODAF
Architecture framework used mainly in military support missions developed by the British Ministry of Defence.
243
Mode transition
When the CPU has to change from processing code in user mode to kernel mode.
244
Monolithic operating system architecture
All of the code of the operating system working in kernel mode in an ad-hoc and non-modularized manner.
245
Multilevel security policies
Outlines how a system can simultaneously process information at different classifications for users with different clearance levels.
246
Multipart virus
Also called a multipartite virus, this has several components to it and can be distributed to different parts of the system. It infects and spreads in multiple ways, which makes it harder to eradicate when identified.
247
Multiplexing
A method of combining multiple channels of data over a single transmission line.
248
Multiprogramming
Interleaved execution of more than one program (process) or task by a single operating system.
249
Multi-protocol Label Switching (MPLS)
A networking technology that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table.
250
Multipurpose Internet Mail Extension (MIME)
The standard for multimedia mail contents in the Internet suite of protocols.
251
Multitasking
Simultaneous execution of more than one program (process) or task by a single operating system.
252
Multi-threading
Applications that can carry out multiple activities simultaneously by generating different instruction sets (threads).
253
Natural languages
Otherwise known as fifth-generation programming languages, which have the goal to create software that can solve problems by themselves. Used in systems that provide artificial intelligence.
254
Network address translation (NAT)
The process of modifying IP address information in packet headers while in transit across a traffic routing device, with the goal of reducing the demand for public IP addresses.
255
Network convergence
The combining of server, storage, and network capabilities into a single framework, which decreases the costs and complexity of data centers. Converged infrastructures provide the ability to pool resources, automate resource provisioning, and increase and decrease processing capacity quickly to meet the needs of dynamic computing workloads.
256
NIST SP 800-30
Risk Management Guide for Information Technology Systems A U.S. federal standard that is focused on IT risks.
257
NIST SP 800-53
Set of controls that are used to secure U.S. federal systems developed by NIST.
258
Noise and perturbation
A technique of inserting bogus information in the hopes of misdirecting an attacker or confusing the matter enough that the actual attack will not be fruitful.
259
Non-Maskable interrupt
Interrupt value assigned to a critical operating system activity.
260
Object
Can be a computer, database, file, computer program, directory, or field contained in a table within a database.
261
Object-Oriented database
Designed to handle a variety of data (images, audio, documents, video), which is more dynamic in nature than a relational database.
262
Object-Relational Database (ORD)
Uses object-relational database management system (ORDBMS) and is a relational database with a software front end that is written in an object-oriented programming language.
263
One-Time Pad
A system that randomly generates a private key, and is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key. One-time pads have the advantage that there is theoretically no way to break the code by analyzing a succession of messages.
264
One-Way Hash
Cryptographic process that takes an arbitrary amount of data and generates a fixed-length value. Used for integrity protection.
265
Online Certificate Status Protocol (OCSP)
Automated method of maintaining revoked certificates within a PKI.
266
Open Mail relay
An SMTP server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users.
267
Open system
Designs are built upon accepted standards to allow for interoperability.
268
Open Systems Interconnection (OSI) model
International standardization of system-based network communication through a modular seven-layer architecture.
269
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
Team-oriented approach that assesses organizational and IT risks through facilitated workshops.
270
Out-of-band method
Sending data through an alternate communication channel.
271
Packages - EALs
Functional and assurance requirements are bundled into packages for reuse. This component describes what must be met to achieve specific EAL ratings.
272
Parameter validation
The values that are being received by the application are validated to be within defined limits before the server application processes them within the system.
273
Passive attack
Attack where the attacker does not interact with processing or communication activities, but only carries out observation and data collection, as in network sniffing.
274
Patent
Grants ownership and enables that owner to legally enforce his rights to exclude others from using the invention covered by the patent.
275
Personally Identifiable Information (PII)
Data that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.
276
Phishing
Phishing is a scam in which the perpetrator sends out legitimate-looking e-mails, in an effort to phish (pronounced fish) for personal and financial information from the recipient.
277
Ping of Death
A DoS attack type on a computer that involves sending malformed or oversized ICMP packets to a target.
278
Plaintext
A message before it has been encrypted or after it has been decrypted using a specific algorithm and key; also referred to as cleartext. (Contrast with ciphertext.)
279
Plenum cables
Cable is jacketed with a fire-retardant plastic cover that does not release toxic chemicals when burned.
280
Policy
High-level document that outlines senior management's security directives.
281
Polymorphic virus
Produces varied but operational copies of itself. A polymorphic virus may have no parts that remain identical between infections, making it very difficult to detect directly using signatures.
282
Polymorphism
Two objects can receive the same input and have different outputs.
283
Ports
Software construct that allows for application- or service-specific communication between systems on a network. Ports are broken down into categories; well known (0-1023), registered (1024-49151), and dynamic (49152-65535).
284
Post Office Protocol (POP)
An Internet standard protocol used by e-mail clients to retrieve e-mail from a remote server and supports simple download-and-delete requirements for access to remote mailboxes.
285
Preemptive multitasking
Multitasking scheduling scheme used by operating systems to allow for computer resource time slicing. Used in newer, more stable operating systems.
286
Pretty Good Privacy (PGP) Cryptosystem
used to integrate public key cryptography with e-mail functionality and data encryption, which was developed by Phil Zimmerman.
287
Primary key
Columns that make each row unique. (Every row of a table must include a primary key.)
288
Private Branch Exchange (PBX)
A small version of the phone company's central switching office. Also known as a private automatic branch exchange. A central telecommunications switching station that an organization uses for its own purposes.
289
Private key
Value used in public key cryptography that is used for decryption and signature creation and known to only key owner.
290
Procedures
Step-by-step implementation instructions.
291
Process
Program loaded in memory within an operating system.
292
Process isolation
Protection mechanism provided by operating systems that can be implemented as encapsulation, time multiplexing of shared resources, naming distinctions, and virtual memory mapping.
293
Process states (ready, running, blocked)
Processes can be in various activity levels. Ready = waiting for input. Running = instructions being executed by CPU. Blocked = process is "suspended."
294
Program counter
Holds the memory address for the following instructions the CPU needs to act upon.
295
Program Status Word (PSW)
Condition variable that indicates to the CPU what mode (kernel or user) instructions need to be carried out in.
296
Protection profile
Description of a needed security solution.
297
Proxy server
A system that acts as an intermediary for requests from clients seeking resources from other sources. A client connects to the proxy server, requesting some service, and the proxy server evaluates the request according to its filtering rules and makes the connection on behalf of the client. Proxies can be open or carry out forwarding or reverse forwarding capabilities.
298
Public key
Value used in public key cryptography that is used for encryption and signature validation that can be known by all parties.
299
Public key cryptography
An asymmetric cryptosystem where the encrypting and decrypting keys are different and it is computationally infeasible to calculate one form the other, given the encrypting algorithm. In public key cryptography, the encrypting key is made public, but the decrypting key is kept secret.
300
Public-Switched Telephone Network (PSTN)
The public circuit-switched telephone network, which is made up of telephone lines, fiber-optic cables, cellular networks, communications satellites, and undersea telephone cables and allows all phone-to-phone communication. It was a fixed-line analog telephone system, but is now almost entirely digital and includes mobile as well as fixed telephones.
301
Qualitative risk analysis
Opinion-based method of analyzing risk with the use of scenarios and ratings.
302
Quantitative risk analysis
Assigning monetary and numeric values to all the data elements of a risk assessment.
303
Quantum cryptography
Use of quantum mechanical functions to provide strong cryptographic key exchange.
304
Race condition
Two or more processes attempt to carry out their activity on one resource at the same time. Unexpected behavior can result if the sequence of execution does not take place in the proper order.
305
RAM
Hardware inside a computer that retains memory on a short-term basis and stores information while the computer is in use. It is the working memory of the computer into which the operating system, startup applications and drivers are loaded when a computer is turned on, or where a program subsequently started up is loaded, and where thereafter, these applications are executed. RAM can be read or written in any section with one instruction sequence. It helps to have more of this working space installed when running advanced operating systems and applications. RAM content is erased each time a computer is turned off. RAM is the most common type of memory found in computers and other devices, such as printers. There are two basic types of RAM: dynamic RAM (DRAM) and static RAM (SRAM).
306
Random Number Generator
Algorithm used to create values that are used in cryptographic functions to add randomness.
307
RC4
Stream symmetric cipher that was created by Ron Rivest of RSA. Used in SSL and WEP.
308
RC5
Block symmetric cipher that uses variable block sizes (32, 64, 128) and variable-length key sizes (0-2040).
309
RC6
Block symmetric cipher that uses a 128-bit block size and variable length key sizes (128, 192, 256). Built upon the RC5 algorithm.
310
Real-time Transport Protocol (RTP)
Used to transmit audio and video over IP-based networks. It is used in conjunction with the RTCP. RTP transmits the media data, and RTCP is used to monitor transmission statistics and QoS, and aids synchronization of multiple data streams.
311
Record
A collection of related data items.
312
Recovery Point Objective (RPO)
A measurement of the point prior to an outage to which data are to be restored.
313
Recovery Time Objective (RTO)
The earliest time period and a service level within which a business process must be restored after a disaster to avoid unacceptable consequences.
314
Reference monitor
Concept that defines a set of design requirements of a reference validation mechanism (security kernel), which enforces an access control policy over subject's (processes, users) ability to perform operations (read, write, execute) on objects (files, resources) on a system.
315
Register
Small, temporary memory storage units integrated and used by the CPU during its processing functions.
316
Registration Authority (RA)
The primary purpose of an RA is to verify an end entity's identity and determine whether it is entitled to have a public key Certificate issued.
317
Relational database model
In a relational database, data is organized in two-dimensional tables or relations.
318
Remote Access Trojans (RATs)
Malicious programs that run on systems and allow intruders to access and use a system remotely.
319
Remote Authentication Dial-In User Service (RADIUS)
A network protocol that provides client/server authentication and authorization, and audits remote users.
320
Remote Journaling
Involves transmitting the journal or transaction log offsite to a backup facility.
321
Replay attack
This type of attack occurs when an attacker intercepts authentication information through the use of network monitoring utilities. The attacker then "replays" this information to the security system in an effort to gain access to the system.
322
Residual risk
Risk that remains after implementing a control. Threats * vulnerabilities * assets * (control gap) = residual risk.
323
Restricted interface
Limits the user's environment within the system, thus limiting access to objects.
324
Rijndael
Block symmetric cipher that was chosen to fulfil the Advanced Encryption Standard. It uses a 128-bit block size and various key lengths (128, 192, 256).
325
Ring topology
Each system connects to two other systems, forming a single, unidirectional network pathway for signals, thus forming a ring.
326
Risk
The probability of a threat agent exploiting a vulnerability and the associated impact.
327
Rollback
An operation that ends a current transaction and cancels all the recent changes to the database until the previous checkpoint/ commit point.
328
ROM
Computer memory chips with preprogrammed circuits for storing such software as word processors and spreadsheets. Information in the computer's ROM is permanently maintained even when the computer is turned off
329
Rootkit
Set of malicious tools that are loaded on a compromised system through stealthy techniques. The tools are used to carry out more attacks either on the infected systems or surrounding systems.
330
Rotation of duties
Detective administrative control used to uncover potential fraudulent activities.
331
Rule-based access
Access is based on a list of rules created or authorized by system owners that specify the privileges granted to users.
332
Running Key Cipher
Substitution cipher that creates keystream values, commonly from agreed-upon text passages, to be used for encryption purposes.
333
SABSA
Framework Risk-driven enterprise security architecture that maps to business initiatives, similar to the Zachman framework.
334
Sandbox
A virtual environment that allows for very fine-grained control over the actions that code within the machine is permitted to take. This is designed to allow safe execution of untrusted code from remote sources.
335
Schema
Defines the structure of the database.
336
Screened host
A firewall that communicates directly with a perimeter router and the internal network. The router carries out filtering activities on the traffic before it reaches the firewall.
337
Screened Subnet architecture
When two filtering devices are used to create a DMZ. The external device screens the traffic entering the DMZ network, and the internal filtering device screens the traffic before it enters the internal network.
338
Scytale Cipher
A simple transposition cipher system that employs a rod of a certain thickness around which was wrapped a long, thin strip of parchment.
339
Secure Electronic Transaction (SET)
The SET specification has been developed by Visa and MasterCard to allow for secure credit card and offline debit card (check card) transactions over the World Wide Web.
340
Secure MIME (S/MIME)
Secure/Multipurpose Internet Mail Extensions, which outlines how public key cryptography can be used to secure MIME data types.
341
Secure Shell (SSH)
Network protocol that allows for a secure connection to a remote system. Developed to replace Telnet and other insecure remote shell methods.
342
Security Assertion Markup Language (SAML)
An XML standard that allows the exchange of authentication and authorization data to be shared between security domains.
343
Security assurance requirements
Measures taken during development and evaluation of the product to assure compliance with the claimed security functionality.
344
Security domain
Resources within this logical structure (domain) are working under the same security policy and managed by the same group.
345
Security functional requirements
Individual security functions which must be provided by a product.
346
Security kernel
The central part of a computer system (hardware, software, or firmware) that implements the fundamental security procedures for controlling access to system resources.
347
Security perimeter
Mechanism used to delineate between the components within and outside of the trusted computing base.
348
Security policy
Strategic tool used to dictate how sensitive information and resources are to be managed and protected.
349
Security Target
Vendor's written explanation of the security functionality and assurance mechanisms that meet the needed security solution.
350
Security through Obscurity
Relying upon the secrecy or complexity of an item as its security, instead of practicing solid security practices.
351
Self-Garbling virus
Attempts to hide from anti-virus software by modifying its own code so that it does not match predefined signatures.
352
Sender Policy Framework (SPF)
An e-mail validation system designed to prevent e-mail spam by detecting e-mail spoofing, a common vulnerability, by verifying sender IP addresses.
353
Separation of Duties
Preventive administrative control used to ensure one person cannot carry out a critical task alone.
354
Server Side Includes (SSI)
An interpreted server-side scripting language used almost exclusively for web-based communication. It is commonly used to include the contents of one or more files into a web page on a web server. Allows web developers to reuse content by inserting the same content into multiple web documents.
355
Service Provisioning Markup Language (SPML)
Allows for the automation of user management (account creation, amendments, revocation) and access entitlement configuration related to electronically published services across multiple provisioning systems.
356
Session hijacking
An intruder takes over a connection after the original source has been authenticated.
357
Session Initiation Protocol (SIP)
The signaling protocol widely used for controlling communication, as in voice and video calls over IP based networks.
358
Session keys
Symmetric keys that have a short lifespan, thus providing more protection than static keys with longer lifespans.
359
Shielded twisted pair (STP)
Twisted-pair cables are often shielded in an attempt to prevent RFI and EMI. This shielding can be applied to individual pairs or to the collection of pairs.
360
Shoulder surfing
Viewing information in an unauthorized manner by looking over the shoulder of someone else.
361
Side-channel attack
Non-Intrusive Attack that uses information (timing, power consumption) that has been gathered to uncover sensitive data or processing functions. Often tries to figure out how a component works without trying to compromise any type of flaw or weakness.
362
Simple Mail Transfer Protocol (SMTP)
An Internet standard protocol for electronic mail (e-mail) transmission across IP-based networks.
363
Simple Network Management Protocol (SNMP)
Provides remote administration of network device; simple because the agent requires minimal software.
364
Simple Object Access Protocol (SOAP)
A lightweight protocol for exchange of information in a decentralized, distributed environment.
365
Single loss expectancy (SLE)
One instance of an expected loss if a specific vulnerability is exploited and how it affects a single asset. Asset Value * Exposure Factor = SLE.
366
Six Sigma
Business management strategy developed by Motorola with the goal of improving business processes.
367
Smart card
Plastic cards, typically with an electronic chip embedded, that contain electronic value tokens. Such value is disposable at both physical retail outlets and online shopping locations.
368
Smurf attack
A DDoS attack type on a computer that floods the target system with spoofed broadcast ICMP packets.
369
Social Engineering
Gaining unauthorized access by tricking someone into divulging sensitive information.
370
Social Engineering Attack
Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.
371
Software Configuration Management (SCM)
Identifies the attributes of software at various points in time, and performs a methodical control of changes for the purpose of maintaining software integrity and traceability throughout the software development life cycle.
372
Software deadlock
Two processes cannot complete their activities because they are both waiting for system resources to be released.
373
Software escrow
Storing of the source code of software with a third-party escrow agent. The software source code is released to the licensee if the licensor (software vendor) files for bankruptcy or fails to maintain and update the software product as promised in the software license agreement.
374
Source Routing
Allows a sender of a packet to specify the route the packet takes through the network versus routers determining the path.
375
Spanning Tree Protocol (STP)
A network protocol that ensures a loop-free topology for any bridged Ethernet LAN and allows redundant links to be available in case connection links go down.
376
Special Registers
Temporary memory location that holds critical processing parameters. They hold values as in the program counter, stack pointer, and program status word.
377
Stack Memory
Construct that is made up of individually addressable buffers. Process-to-process communication takes place through the use of stacks.
378
Standard
Compulsory rules that support the security policies.
379
Star topology
Network consists of one central device, which acts as a conduit to transmit messages. The central device, to which all other nodes are connected, provides a common connection point for all nodes.
380
Statement of Work (SOW)
Describes the product and customer requirements. A detailed-oriented SOW will help ensure that these requirements are properly understood and assumptions are not made.
381
Static analysis
A debugging technique that is carried out by examining the code without executing the program, and therefore is carried out before the program is compiled.
382
Statistical attack
Cryptanalysis attack that uses identified statistical patterns.
383
Statistical Time-Division Multiplexing (STDM)
This form of multiplexing uses all available time slots to send significant information and handles inbound data on a first-come, first-served basis.
384
Stealth virus
A virus that hides the modifications it has made. The virus tries to trick anti-virus software by intercepting its requests to the operating system and providing false and bogus information.
385
Steganography
(1) The method of concealing the existence of a message or data within seemingly innocent covers. (2) A technology used to embed information in for example, audio and graphical material. The audio and graphical materials appear unaltered until a steganography tool is used to reveal the hidden message.
386
Stream cipher
An encryption method in which a cryptographic key and an algorithm are applied to each bit in a datastream, one bit at a time.
387
Subject
An active entity that requests access to an object or the data within an object.
388
Subnet
Logical subdivision of a network that improves network administration and helps reduce network traffic congestion. Process of segmenting a network into smaller networks through the use of an addressing scheme made up of network and host portions.
389
Substitution Cipher
Encryption method that uses an algorithm that changes out (substitutes) one value for another value.
390
Symmetric algorithm
Encryption method where the sender and receiver use an instance of the same key for encryption and decryption purposes.
391
Symmetric Mode Multiprocessing
When a computer has two or more CPUs and each CPU is being used in a load-balancing method.
392
SYN flood
DoS attack where an attacker sends a succession of SYN packets with the goal of overwhelming the victim system so that it is unresponsive to legitimate traffic.
393
Synchronous communication
Transmission sequencing technology that uses a clocking pulse or timing scheme for data transfer synchronization.
394
Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH)
Standardized multiplexing protocols that transfer multiple digital bit streams over optical fiber and allow for simultaneous transportation of many different circuits of differing origin within a single framing protocol.
395
Synchronous Token Device
Synchronizes with the authentication service by using time or a counter as the core piece of the authentication process. If the synchronization is time-based, the token device and the authentication service must hold the same time within their internal clocks.
396
System Development Life Cycle (SDLC)
The scope of activities associated with a system, encompassing the system's initiation, development and acquisition, implementation, operation and maintenance, and, ultimately, its disposal, which instigates another system initiation.
397
Target of Evaluation (TOE)
Product proposed to provide a needed security solution.
398
T-carriers
Dedicated lines that can carry voice and data information over trunk lines.
399
TCP/IP model
Standardization of device-based network communication through a modular four-layer architecture. Specific to the IP suite, created in 1970 by an agency of the U.S. Department of Defense (DoD).
400
Teredo
Transition mechanism for migrating from IPv4 to IPv6. It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network, but also performs its function behind NAT devices.
401
Thread
Instruction set generated by a process when it has a specific activity that needs to be carried out by an operating system. When the activity is finished, the thread is destroyed.
402
Threat
The danger of a threat agent exploiting a vulnerability.
403
Threat agent
Entity that can exploit a vulnerability.
404
Threat modeling
A systematic approach used to understand how different threats could be realized and how a successful compromise could take place.
405
Time Multiplexing
Technology that allows processes to use the same resources.
406
Time-Division Multiplexing (TDM)
A type of multiplexing in which two or more bit streams or signals are transferred apparently simultaneously as sub-channels in one communication channel, but are physically taking turns on the single channel.
407
Time-of-Check/Time-of-Use (TOC/TOU) attack
Attacker manipulates the "condition check" step and the "use" step within software to allow for unauthorized activity.
408
TOGAF
Enterprise architecture framework used to define and understand a business environment developed by The Open Group.
409
Token ring
LAN medium access technology that controls network communication traffic through the use of token frames. This technology has been mostly replaced by Ethernet.
410
Total risk
Full risk amount before a control is put into place. Threats * vulnerabilities * assets = total risk.
411
Trade secrets
Proprietary business or technical information, processes, designs, practices, etc. that are confidential and critical to the business.
412
Trademark
Protect words, names, product shapes, symbols, colors, or a combination of these used to identify products or a company. These items are used to distinguish products from the competitors' products.
413
Transmission Control Protocol (TCP)
The major transport protocol in the Internet suite of protocols providing reliable, connection-oriented, full-duplex streams.
414
Transport mode
Mode that IPSec protocols can work in that provides protection for packet data payload.
415
Transposition
Encryption method that shifts (permutation) values.
416
Triple DES (3-DES)
Symmetric cipher that applies DES three times to each block of data during the encryption process.
417
Trojan Horse
A program that is disguised as another program with the goal of carrying out malicious activities in the background without the user knowing.
418
Trusted Computer System Evaluation Criteria (TCSEC)
U.S. DoD standard used to assess the effectiveness of the security controls built into a system. Replaced by the Common Criteria. Also known as the Orange Book.
419
Trusted Computing Base (TCB)
A collection of all the hardware, software, and firmware components within a system that provide security and enforce the system's security policy.
420
Trusted path
Trustworthy software channel that is used for communication between two processes that cannot be circumvented.
421
Tunnel mode
Mode that IPSec protocols can work in that provides protection for packet headers and data payload.
422
Tuple
A row in a two-dimensional database.
423
Two-Phase Commit
A mechanism that is another control used in databases to ensure the integrity of the data held within the database.
424
Type I error
When a biometric system rejects an authorized individual (false rejection rate).
425
Type II error
When the system accepts impostors who should be rejected (false acceptance rate).
426
Uncertainty Analysis
Assigning confidence level values to data elements.
427
Unshielded Twisted Pair (UTP)
Cabling in which copper wires are twisted together for the purposes of canceling out EMI from external sources. UTP cables are found in many Ethernet networks and telephone systems.
428
User Datagram Protocol (UDP)
Connectionless, unreliable transport layer protocol, which is considered a "best effort" protocol.
429
User mode (problem state)
Protection mode that a CPU works within when carrying out less trusted process instructions.
430
User provisioning
The creation, maintenance, and deactivation of user objects and attributes as they exist in one or more systems, directories, or applications, in response to business processes.
431
Validation
Determines if the product provides the necessary solution for the intended real-world problem.
432
Verification
Determines if the product accurately represents and meets the specifications.
433
Very high-level languages
Otherwise known as fourth-generation programming languages and are meant to take natural language-based statements one step ahead.
434
View
A virtual relation defined by the database administrator in order to keep subjects from viewing certain data.
435
Virtual Local Area Network (VLAN)
A group of hosts that communicate as if they were attached to the same broadcast domain, regardless of their physical location. VLAN membership can be configured through software instead of physically relocating devices or connections, which allows for easier centralized management.
436
Virtual memory
Combination of main memory (RAM) and secondary memory within an operating system.
437
Virtualization
Creation of a simulated environment (hardware platform, operating system, storage, etc.) that allows for central control and scalability.
438
Virus
A small application, or string of code, that infects host applications. It is a programming code that can replicate itself and spread from one system to another.
439
Vishing (Voice and Phishing)
Social engineering activity over the telephone system, most often using features facilitated by VoIP, to gain unauthorized access to sensitive data.
440
VLAN hopping
An exploit that allows an attacker on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.
441
Voice over IP (VoIP)
The set of protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice data and multimedia sessions over IP-based networks.
442
Vulnerability
Weakness or a lack of a countermeasure.
443
War dialing
When a specialized program is used to automatically scan a list of telephone numbers to search for computers for the purposes of exploitation and hacking.
444
Wave-Division Multiplexing (WDM)
Multiplying the available capacity of optical fibers through use of parallel channels, with each channel on a dedicated wavelength of light. The bandwidth of an optical fiber can be divided into as many as 160 channels.
445
Web proxy
A piece of software installed on a system that is designed to intercept all traffic between the local web browser and the web server.
446
Wide Area Network (WAN)
A telecommunication network that covers a broad area and allows a business to effectively carry out its daily function, regardless of location.
447
Wiretapping
A passive attack that eavesdrops on communications. It is only legal with prior consent or a warrant.
448
Work Breakdown Structure (WBS)
A project management tool used to define and group a project's individual work elements in an organized manner.
449
Wormhole attack
This takes place when an attacker captures packets at one location in the network and tunnels them to another location in the network for a second attacker to use against a target system.
450
Worms
These are different from viruses in that they can reproduce on their own without a host application and are self-contained programs.
451
Zachman framework
Enterprise architecture framework used to define and understand a business environment developed by John Zachman.
452
Zero Knowledge Proof
One entity can prove something to be true without providing a secret value.