Glossary- A Flashcards
acceptable use
Security policy that defines the types of activities that are acceptable and those that are not acceptable.
access bypass
Any attempt by an intruder to bypass access controls in order to gain entry into a system.
access control
Any means that detects or prevents unauthorized access and that per- mits authorized access.
access control list (ACL)
An access control method where a list of permitted or de- nied users (or systems, or services, as the case may be) is used to control access.
access control log
A record of attempted accesses.
access control policy
Statement that defines the policy for the granting, review, and
revocation of access to systems and work areas.
access management
A formal business process that is used to control access to net- works and information systems.
access point
A device that provides communication services using the 802.11 (Wi-Fi) protocol standard.
access review
A review of the users, systems, or other subjects that are permitted to access protected objects. The purpose of a review is to ensure that all subjects should still be authorized to have access.
account lockout
An administrative lock that is placed on a user account when a pre- determined event occurs, such as reaching an expiration date, or when there have been several unsuccessful attempts to access the user account.
address resolution protocol (ARP)
A standard network protocol used to obtain the address for another station on a local area network (LAN).
administrative audit
An audit of operational efficiency.
administrative control
Controls in the form of policies, processes, procedures, and
standards.
agile development
Software development process where a large project team is bro- ken up into smaller teams, and project deliverables are broken up into smaller pieces, each of which can be attained in a few weeks.
algorithm
In cryptography, a specific mathematical formula that is used to perform encryption, decryption, message digests, and digital signatures.
annualized loss expectancy (ALE)
The expected loss of asset value due to threat real- ization. ALE is defined as SLE × ARO.
annualized rate of occurrence (ARO)
An estimate of the number of times that a threat will occur every year.
anti-malware
See antivirus software.
antivirus software
Software that is designed to detect and remove viruses and other
forms of malware.
AppleTalk
The suite of protocols used to transmit packets from one station to an- other over a network.
appliance
A type of computer with preinstalled software that requires little or no maintenance.
application
Layer 7 of the OSI network model. See also OSI network model.
OR
Layer 4 of the TCP/IP network model. The purpose of the application layer is the delivery of messages from one process to another on the same network or on different networks. See also TCP/IP network model.
application firewall
A device used to control packets being sent to an application server, primarily to block unwanted or malicious content.
application programming language
See programming language.