Glossary Flashcards
(85 cards)
atomicity
The characteristic of a complex transaction whereby it is either performed completely as a single unit or not at all.
attribute sampling
A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic. See also sampling.
audit charter
A written document that defines the mission and goals of the audit program as well as roles and responsibilities
802.11
The wireless network standard commonly known as “Wi-Fi” that can transport data up to 108 Mbit/sec up to a distance of 300 m.
802.1X
A standard for network authentication and access control for devices designed to attach to a LAN or wireless LAN.
acceptable use
Security policy that defines the types of activities that are acceptable and those that are not acceptable.
access bypass
Any attempt by an intruder to bypass access controls in order to gain entry into a system.
access control
Any means that detects or prevents unauthorized access and that permits authorized access.
access control list (ACL)
An access control method where a list of permitted or denied users (or systems, or services, as the case may be) is used to control access.
access control log
A record of attempted accesses.
access control policy
Statement that defines the policy for the granting, review, and revocation of access to systems and work areas.
access management
A formal business process that is used to control access to networks and information systems.
access point
A device that provides communication services using the 802.11 (Wi-Fi) protocol standard.
access review
A review of the users, systems, or other subjects that are permitted to access protected objects. The purpose of a review is to ensure that all subjects should still be authorized to have access.
account lockout
An administrative lock that is placed on a user account when a predetermined event occurs, such as reaching an expiration date, or when there have been several unsuccessful attempts to access the user account.
accumulation of privileges
A situation where an employee accumulates computer system access privileges over a long period of time, due to internal transfers or other privilege changes, and old access privileges are not removed.
Address Resolution Protocol (ARP)
A standard network protocol used to obtain the address for another station on a local area network (LAN).
administrative audit
An audit of operational efficiency.
administrative control
Controls in the form of policies, processes, procedures, and standards.
agile development
Software development process where a large project team is broken up into smaller teams, and project deliverables are broken up into smaller pieces, each of which can be attained in a few weeks.
algorithm
In cryptography, a specific mathematical formula that is used to perform encryption, decryption, message digests, and digital signatures.
annualized loss expectancy (ALE)
The expected loss of asset value due to threat realization. ALE is defined as SLE × ARO.
annualized rate of occurrence (ARO)
An estimate of the number of times that a threat will occur every year.
anti-malware
Software that uses various means to detect and block malware. See also antivirus software.