Glossary Part 2 Flashcards
(177 cards)
steganography
A technique for obscuring the presence of a message, often by embedding information within a file or other entity.
software as a service (SaaS)
A cloud service model that provisions fully developed application services to users.
Transport Layer Security virtual private network (TLS VPN)
Virtual private networking solution that uses digital certificates to identify, host, and establish secure tunnels for network traffic.
role-based access control (RBAC)
An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.
secure enclave
CPU extensions that protect data stored in system memory so that an untrusted process cannot read it.
sensor (alarms)
A component in an alarm system that identifies unauthorized entry via infrared-, ultrasonic-, microwave-, or pressure-based detection of thermal changes or movement.
self-signed certificate
A digital certificate that has been signed by the entity that issued it, rather than by a CA.
vulnerability
A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
vulnerability feed
A synchronizable list of data and scripts used to check for vulnerabilities. Also referred to as plug-ins or network vulnerability tests (NVTs).
risk mitigation
The response of reducing risk to fit within an organization’s willingness to accept risk.
sinkhole
A DoS attack mitigation strategy that directs the traffic that is flooding a target IP address to a different network for analysis.
system/process audit
An audit process with a wide scope, including assessment of supply chain, configuration, support, monitoring, and cybersecurity factors.
state table
Information about sessions between hosts that is gathered by a stateful firewall.
serverless
A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances.
under-voltage event
When the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly. Under-voltage events are long sags in power output that are often caused by overloaded or faulty grid distribution circuits or by a failure in the supply route from the electrical power station to a building.
subject alternative name (SAN)
A field in a digital certificate allowing a host to be identified by multiple host names/subdomains.
Trojan
A malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.
risk deterrence
In risk mitigation, the response of deploying security controls to reduce the likelihood and/or impact of a threat scenario.
root certificate authority
In PKI, a CA that issues certificates to intermediate CAs in a hierarchical structure.
service disruption
A type of attack that compromises the availability of an asset or business process.
SMiShing
A form of phishing that uses SMS text messages to trick a victim into revealing information.
serverless computing
Features and capabilities of a server without needing to perform server administration tasks. Serverless computing offloads infrastructure management to the cloud service provider—for example, configuring file storage capability without the requirement of first building and deploying a file server.
Temporal Key Integrity Protocol (TKIP)
The mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.
Sender Policy Framework (SPF)
A DNS record identifying hosts authorized to send mail for the domain.