glossary of key terms Flashcards
The maintenance and verification of a desired level of
quality of software, a product, or service.
quality assurance (QA)
Policies that define the rules restricting how a computer, network, or other system may be used.
acceptable use policies
A list of permissions attached to an object specifying what level of access a user, users, or groups have to that object. When you’re
dealing with firewalls a set of rules that apply to a list of network
names, IP addresses, and port numbers
access control list (ACL)
A collection of policies to determine the level of access
that a subject (user or system) has on a resource (the system, application, or data
to be protected). There are four major types
access control model / Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Discretionary Access Control (DAC), and Rule-Based Access Control (RBAC or RB-RBAC).
In digital forensics, the process of collecting specific data related to
an attack, intrusion, or investigation, which can include computer media and other
devices that store electronic data.
acquisition
A Microsoft directory service that authenticates and authorizes
users and computers.
Active Directory
An attacker’s method that is carried out on a target mostly
by using network and vulnerability scanners.
active reconnaissance
Assessment that measures risk by using exact monetary values. It attempts to give an expected yearly loss in dollars for any given risk.
It also defines asset values to servers, routers, and other network equipment.
quantitative risk assessment
A load-balancing scenario in which each device performs work
simultaneously, thus sharing the load.
active/active
A load-balancing scenario in which one device actively performs
work while the other works in a standby mode.
active/passive
A programming method involving
random arrangement of different address spaces used by a program (or process). It
helps prevent the exploitation of buffer overflows, remote code execution, and memory corruption vulnerabilities. It also can aid in protecting mobile devices (and other
systems) from exploits caused by memory-management problems
address space layout randomization (ASLR)
Accounts on a system with higher-level privileges. They
are similar to root accounts on a Linux system.
administrator accounts
A sophisticated attack that can remain undetected for a long time. Also, a government (state actor) attack is often also referred
to
advanced persistent threat (APT)
The tactics, techniques,
and procedures used by attackers to compromise a system or a network.
adversary tactics, techniques, and procedures (TTPs)
A concept that refers to the gap or lack of connection between a computer
and other networks. Because the computer isn’t directly connected to the network, it
can’t be attacked through the network
air gap
A list of allowed applications or functions that are accessible to a specific
resource, such as another application, a system, or a user. The list is inclusive; if the
application is not listed, access is denied
allow list
A VPN client that immediately and automatically establishes a
VPN connection when an Internet connection is made.
always-on VPN
The total expected loss in dollars per year due
to a specific incident.
annualized loss expectancy (ALE)
The number of times per year that a
specific incident occurs.
annualized rate of occurrence (ARO)
A method of obfuscating data such that the data can be used for
legitimate purposes while not exposing the identity of the data owner.
anonymization
Software that protects against infections caused by many types of
malware, including all types of viruses, as well as rootkits, ransomware, and spyware.
antimalware
A computer program used to prevent, detect, and remove
malware.
antivirus software
Cloud-based services that don’t fall into SaaS, PaaS,
or IaaS. For example, when a large service provider integrates its security services
into the company/customer’s existing infrastructure, it is often referred to as Security as a service (SECaaS).
anything as a service (XaaS)
A capability available in all cloud computing
environments. It allows for better automation of workflow deployment. These integrations typically need to be enabled in the environment to utilize them.
API inspection and integration