C(s) Flashcards

1
Q

Cable modem

A

Provide Internet access via broadband cable TV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cache memory

A

The fastest memory on the system, required to keep up with the CPU as it fetches and executes instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Caesar Cipher

A

A rot-3 substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Callback

A

Modern-based authentication system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Caller ID

A

Identifies the calling phone number, sometimes used as a weak authentication method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Candidate keys

A

Any attribute (column) in the table with unique values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CMM

A

Capability Maturity Model, a maturity framework for evaluating and improving the software development process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CSMA

A

Carrier Sense Multiple Access, a method used by Ethernet networks to allowed shared usage of a baseband network, and avoid collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CASE

A

Computer-aided software engineering, uses programs to create assist in the creation and maintenance of other computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CBC

A

Cipher Block Chaining , a block mode of DES that XORs the previous encrypted block of cipher-text to the next block plaintext to be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CCD

A

Charged Couple Discharge, a digital CCTV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CCMP

A

Counter Mode CBC MAC Protocol, used by WPA2 to create a MIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CCTV

A

Closed Circuit Television, a detective device used to aid guards in in detecting the presence of intruders in restricted areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CDN

A

Content Distribution Networks (also Content Delivery Networks) use a series of distributed caching servers to improve performance and lower the latency of downloaded online content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CPU

A

Central Processing Unit, the “brains” of the computer, capable of controlling and performing mathematical calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Centralized access control

A

Concentrates Access control in one logical point for a system or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CER

A

Crossover error rate, describes the point where the false reject rate(FRR) and false accept rate(FAR) are equal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Certificate Authority

A

PKI component that authenticates the identity of a person or organization before issuing a certificate to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CRL

A

Certificate Revocation Lists, PKI component which lists digital certificates that have been revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Certification

A

A detailed inspection that verifies whether a system meets the documented security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CFB

A

Cipher Feedback, a stream mode DES that is similar to block-mode CBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Chain of custody

A

Requires that once evidence is acquired, full documentation regarding who, what, when, and where evidence was handled is maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Chaining

A

Block cipher mechanism that seeds the previous Encrypted block into the next block to be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CHAP

A

Challenge Handshake Authentication Protocol, a more secure network authentication protocol that uses a shared secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Change management
The process of understanding, communicating , and documenting changes
26
CSU/DSU
Channel Service Unit/Data Service Unit, DCE device
27
Checklist testing
Lists all necessary components required for successful recovery, and ensures that they are, or will be , readily available should a disaster occur. Also known as consistency testing
28
CIA triad
Confidentiality, integrity, and availability
29
CIDR
Classless Inter-Domain Routing, allows for many network sizes beyond the arbitrary state-full network sizes
30
Cipher
A cryptographic algorithm
31
Cipher disk
Cryptographic device that uses two concentric disks each with alphabet around the periphery
32
Ciphertext
An encrypted message
33
Circuit-level proxy
Proxy firewall that operates at Layer 5
34
Circuit-switched network
Network that provides a dedicated circuit or channel between two nodes
35
Circumstantial evidence
Evidence that serves to establish the circumstances related to particular points or even other evidence
36
CIRT
Computer Incident Response Team, a team that performs incident handling
37
CISC
Complex Instruction Set Computer, CPU instructions that are longer and more powerful
38
Civil law
Law that resolves disputes between individuals or organizations
39
Civil law (legal system)
Legal system that leverages codified laws or statutes to determine what is considered within the bounds of law
40
Clark-Wilson
Real-world integrity model that protects integrity by having subjects access objects via programs
41
Class I gate
Residential gate designed for home use
42
Class II gate
Commercial gate, such as a parking garage gate
43
Class III gate
Industrial/limited access gate, such as a large loading dock
44
Class IV gate
Restricted access gate, used at an airport or prison
45
Classful addresses
IPv4 Networks in classes A through E
46
Clearance
A determination, typically made by a senior security professional, about whether or not a user can be trusted with a specific level of information
47
Client-side attacks
Attack where a user downloads malicious content
48
Clipper Chip
(Failed) 1993 Escrowed Encryption Standard (EES), which used the Skipjack algorithm
49
Clipping level
A minimum reporting threshold level
50
Closed source
Software released in executable form: the source code is kept confidential
51
Closed system
System using proprietary hardware or software
52
CMP
Crisis Management Plan
53
Coaxial
Network cabling that has an inner copper core separated by an insulator from a metallic braid or shield
54
COBIT
Control Objectives for Information and related Technology, a control framework for employing information security governance best practices within an organization
55
COCOM
Committee for Multilateral Export Controls, a munitions law which was in effect from 1947 to 1994. It was designed to control the export of critical technologies (including cryptography) to “Iron Curtain” countries during the Cold War
56
Code Repositories
Secure service for storing source code of projects, a public example is GitHub
57
Codebreakers(The)
David Kahn’s history of cryptography
58
Cohesion
OOP concept that describes an independent object. Objects with high cohesion have low coupling
59
Cold site
A backup site with raised floor, power, utilities, and physical security, and no configured systems or data
60
Collection Limitation Principle
OECD Privacy Guideline Principle which states personal data collection should have limits, be obtained in a lawful manner, and, unless there is a compelling reason to the contrary, with the individuals knowledge and approval
61
Collision
Two or more plaintexts that generate the same hash
62
Collusion
An agreement between two or more individuals to subvert the security of a system
63
Color of law
Acting on the authority of law enforcement
64
COM
Component Object Model, locates, and connects objects locally
65
Combinatorial software testing
Black box testing method that seeks to identify and test all unique combinations of software inputs
66
Commandments of Computer Ethics
The Computer Ethnics Institute code of ethics
67
Commit
Makes changes to a database permanent
68
Common criteria
An internationally agreed upon standard for describing and testing the security of IT products
69
CORBA
Common Object Request Broker Architecture, an open vendor-neutral networked object broker framework
70
Compartmentalization
Technical enforcement of need to know
71
Compensating Controls
Additional security controls put in place to compensate for weaknesses in other Controls
72
Compensatory damages
Damages provides as compensation
73
Compiler
Convert source code, such as C or Basic , and compile it into machine code
74
Computer bus
The primary communication channel on a computer system
75
Computer crimes
Crimes using computers
76
Computer Fraud and Abuse Act
Title 18 United States Code Section 1030
77
CSIRT
Computer Security Incident Response Team, the group that is tasked with monitoring, identifying, and responding to security incidents
78
COTS
Commercial Off-the-Shelf Software, third-party developed commercial software available to the general public
79
BIA
Conduct the business impact analysis (BIA) second step of the NIST SP 800-34 contingency planning process
80
Confidentiality
Seeks to prevent the unauthorized disclosure of information
81
Configuration management
The process of developing a consistent system security configuration that can be leveraged throughout an organization
82
Confusion
The relationship between the plaintext and cipher-text should be as confused (or as random) as possible
83
Containment phase
Incident response phase that attempts to keep further damage from occurring as a result of the incident
84
Content-dependent Access control
Adds additional criteria beyond identification and authentication: the actual content the subject is attempting to access
85
Context-dependent Access control
Adds additional criteria beyond identification and authentication: the context of the access, such as time
86
COOP
Continuity of Operations Plan, a plan to maintain operations during a disaster
87
Continuity of Support Plan
Focuses narrowly on a support of specific IT systems and applications
88
CPPT
Continuity planning project team, a team comprised of stakeholders within an organization and focuses on identifying who would need to play a role if a specific emergency event were to occur
89
Contraband check
Seek to identify objects that are prohibited to enter a secure perimeter (such as an airplane)
90
Control Unit
CPU component that acts as a traffic cop, sending instructions to the ALU
91
Convergence
All routers on a network agree on the state of routing
92
Corrective Comtrols
Controls that correct a damaged system or process
93
Corroborative evidence
Evidence that provides additional support for a fact that might have been called into question
94
CTR
Counter, a stream mode of DES that uses a counter for feedback
95
Coupling
OOP concept that connects objects to others. Highly coupled objects have low cohesion
96
Covert channel
Any communication that violates security policy
97
Cracker
A black hat hacker
98
Criminal law
Law where the victim can be seen as society itself
99
Crippleware
Partially functioning proprietary software, often with key features disabled. The user is typically required to make a payment to unlock the full functionality
100
Crossover
Genetic algorithm concept that combines two algorithms
101
Cross-site scripting
Or XSS , third-party execution of web scripting languages such as JavaScript within the security context of a trusted site
102
Cryptanalysis
The science of breaking encrypted messages (recovering their meaning)
103
Cryptographic Protocol governance
Describes the process of selecting the right cipher and implementation for the right job
104
Cryptography
Science of creating messages whose meaning is hidden
105
Crypytology
The science of secure communication
106
CSRF
Cross-site request forgery, third-party redirect of static content within the security context of a trusted site
107
Custodian
Provides hands-on protection of assets
108
Customary law
Customs or practices that are so commonly accepted by a group that the custom is treated as a law
109
CWR
New TCP flag, congestion window reduced
110
Cyber Incident response plan
Plan designed to respond to disruptive cyber events , including network-based attacks, worms, computer viruses, Trojan horses
111
Cybersquatting
Registering internet domain names associated with another organization’s intellectual property