vocabularyS Flashcards

1
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions is an application layer secure e-mail protocol that uses an encryption system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SBU

A

Sensitive but Unclassified is information that has some controls built into it. It is available on a need-to-know basis, but is not classified to the degree that a security clearance is needed to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scalar Processor

A

A type of processor that handles linear executions one instruction at a time. Pipelining may be invoked in this type of processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Screened Host

A

A firewall architecture in which a packet filtering router is placed between the trusted and untrusted networks and a bastion host is placed between the packet filtering router and the trusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Screened Subnet

A

A firewall architecture configuration in which a small subnet is attached to the bastion host creating a DMZ that is perfect for a Web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Script Kiddie

A

An amateur cracker with few real skills that uses virus-generation software to create virus code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SDLC

A

Synchronous Data Link Control is a data transmission protocol developed in the 1970s by IBM to ease connections to mainframe computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secondary Memory

A

Nonvolatile memory such as hard disks, floppy disks, USB drives, memory sticks, and memory drives. Secondary memory is used to copy data when the machine will be turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secret Information

A

Information that is intended for managers of government organizations. Requires an elevated security clearance and requirement to know of the information in order to perform a task or duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Kernel

A

A collection of components that work together to provide the reference monitors functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Label

A

A concept that assigns a classification level to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Policy

A

A policy that represents the management and organizations position on security. It dictates the organizations strategy and attitude towards general and specific security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sensor

A

A type of physical access control that detects movement, then activates an alarm. Some types of sensors may be infrared motion detectors and gas detectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Separation of Privilege

A

A security control architecture where a single user is never allowed to complete a sensitive task. This type of architecture requires two or more authorized users to complete a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sequential Access

A

The act of accessing memory in a sequential order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Server

A

The computer that runs administrative software and controls access to the network and other resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SESAME

A

Secure European System for Applications in a Multivendor Environment is an authentication service for use in Europe. SESAME uses public key cryptography to distribute secret keys and a Privilege Attribute Certificate mechanism which contains key information and the necessary authentication packet to pass authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Session Hijacking

A

An attack in which the attacker intercepts the credentials of a valid session. The attacker then acts as though he/she is a valid user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Session Layer

A

The layer of the ISO/OSI reference model that manages sessions and synchronizes data flow. The session layer logically connects to the other machine, maintaining session information to create a flow of messages back and forth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SET Protocol

A

Secure Electronics Transactions protocol is an application layer protocol developed by Visa and MasterCard to authenticate the sender and the receiver. It uses digital certificates and signatures to provide data confidentiality and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SHA-1

A

Secure Hash Algorithm is a hashing algorithm developed by the National Institute of Standards and Technology in which the input can be any size and it generates a 160-bit digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Shoulder Surfing

A

An observation technique in which information is obtained by looking over someones shoulder.

23
Q

Simulated Test

A

A type of test in which the DRP team evaluates specific scenarios and partially tests the plan by simulating as much of a disaster as is feasible.

24
Q

Single State

A

An operating state in which the system is capable of handling information only one security level at a time.

25
Q

SKIP

A

Simple Key Management for Internet Protocols is a transport layer security protocol that provides high availability using encryption.

26
Q

Skipjack

A

A symmetric cryptographic algorithm standard that operates on 64-bit blocks and uses an 80-bit key.

27
Q

SLE

A

Single Loss Expectancy is the amount that is expected to be lost from a single realized threat in one year.

28
Q

Smart Card

A

A device that provides identification and/or authentication for the bearer. A smart card is a technical control which contains a magnetic strip or a computer chip that can be read by a card reader.

29
Q

SMTP

A

Simple Mail Transfer Protocol is a TCP/IP protocol used on the Internet to route e-mail messages from one computer to another computer on a network.

30
Q

Sniffing

A

The act of monitoring data that travels across a network. Sniffers can be inserted almost anywhere in a network and are difficult to detect.

31
Q

Social Engineering

A

The process of convincing an authorized user to perform an unauthorized action. The target may or may not realize that they are helping an attacker compromise the system.

32
Q

Software

A

Anything that can be stored electronically. Software is a set of instructions or source code that accomplish a task when executed.

33
Q

Software Configuration Management

A

A philosophy of formal management and documentation of each step in software development cycles.

34
Q

Software Escrow Arrangement

A

An arrangement ensuring a copy of the software licensed by the organization has been put into a secure location. The arrangement is made to protect the organization and to allow them to retain ownership rights of the software if the software provider goes out of business.

35
Q

Software Piracy

A

Installing and/or using any software that is not legally licensed for that particular machine.

36
Q

Spamming

A

A type of DoS attack that floods the mail server with useless messages in order to reduce the availability of the mail server.

37
Q

Spoofing

A

A technique used by hackers to gain entry to a system by modifying packet headers so as to appear as a trusted host.

38
Q

SQL Server

A

Structured query language server is a client/server relational database management system.

39
Q

SSL

A

Secure Sockets Layer is a protocol that uses a public key to encrypt data sent during communication over the Internet.

40
Q

SSO

A

Single Sign-On is a method that allows the users to have a domain of control. SSO simplifies the authentication process by allowing the users to authenticate themselves into an entry point of a domain which signs them into every component of the domain.

41
Q

Star Topology

A

A LAN topology with a central device, such as a hub or a repeater, that all nodes are connected to and all messages must travel through.

42
Q

State Machine Model

A

A mathematical model that shows the state of a system, which is a snapshot of all instances of subjects and objects.

43
Q

Stealth

A

A virus that not only infects files, but covers its tracks to hide its existence from antivirus software.

44
Q

Steganography

A

A cryptographic practice in which the fact that a message is encrypted is hidden.

45
Q

STP

A

Shielded twisted pair is a UTP with a layer of foil wrapped around all of the pairs protecting them from emanations.

46
Q

Stream Cipher

A

A category of cipher in which each character is encrypted.

47
Q

Structured Walk-through

A

A test in which the DRP team leader uses role-playing to simulate a disaster. This type of test provides an opportunity for immediate feedback and open discussion.

48
Q

Substitution Cipher

A

A type of cipher that replaces each character of a plaintext message with something else. A table of plaintext characters and their associated substitute characters or a simple algorithm are all that is needed to use this type of cipher.

49
Q

Superscalar

A

A type of processor that handles multiple instructions executed at one time; the instructions are handled through hardware or software. Many pipeline stages can be executed simultaneously.

50
Q

SWIPE

A

A network layer security protocol for IP that provides transport layer security, confidentiality, integrity, and availability for IP.

51
Q

Switch

A

A device in a network that forwards packets and filters to different ports with specific network addresses. Switches operate at the data-link or network layer.

52
Q

Symmetric Algorithm

A

An algorithm in which the same key is used to encrypt and decrypt messages. A symmetric algorithm may also be called a secret key algorithm.

53
Q

Synchronized Device

A

A token device that generates time-based passwords to correspond with a central server.

54
Q

System High

A

A monolithic security level which only allows handling of data that all users are cleared to access.