ITPROTV Security Glossary Flashcards
(367 cards)
6to4
Transition mechanism for migrating from IPv4 to IPv6 . It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network .
Absolute addresses
Hardware addresses used by the CPU .
Abstraction
The capability to suppress unnecessary details so the important, inherent properties can be examined and reviewed .
Accepted ways for handling risk
Avoid, accept, transfer (share), mitigate, recast .
Access
The flow of information between a subject and an object .
Access control
security features that control how users and systems communicate and interact with other systems and resources .
Access control list (ACL)
Mechanism implementing discretionary and/or mandatory access control between subjects and objects .
Access Control Matrix
A table of subjects and objects indicating what actions individual subjects can take upon individual objects .
Access control mechanism
Security safeguard designed to detect and deny unauthorized access and permit authorized access in an information system.
Access Control Model
A framework that dictates how subjects access objects .
Access level
Hierarchical portion of the security level used to identify the sensitivity of information system data and the clearance or authorization of users . Access level, in conjunction with the nonhierarchical categories, forms the sensitivity label of an object .
Access list
(IS) Compilation of users, programs, or processes and the access levels and types to which each is authorized . (COMSEC) Roster of individuals authorized admittance to a controlled area .
Access profile
Associates each user with a list of protected objects the user may access .
Access type
– Privilege to perform action on an object . Read, write, execute, append, modify, delete, and create are examples of access types .
Accountability
(IS) Process of tracing information system activities to a responsible source . (COMSEC) Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information .
Accreditation
Formal acceptance of the adequacy of a system’s overall security by management .
Accrediting authority
Synonymous with Designated Accrediting Authority (DAA) .
ActiveX
– A Microsoft technology composed of a set of OOP technologies and tools based on COM and DCOM . It is a framework for defining reusable software components in a programming language-independent manner
Address bus
Physical connections between processing components and memory segments used to communicate the physical memory addresses being used during processing procedures .
Address Resolution Protocol (ARP) –
A networking protocol used for resolution of network layer IP addresses into link layer MAC addresses .
Address space layout randomization (ASLR)
Memory protection mechanism used by some operating systems . The addresses used by components of a process are randomized so that it is harder for an attacker to exploit specific memory vulnerabilities .
Adequate security
Security commensurate with the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information . This includes assuring that information systems operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of cost-effective management, personnel, operational, and technical controls . (OMB Circular A-130)
Advanced Encryption Standard (AES)
FIPS approved cryptographic algorithm that is a symmetric block cipher using cryptographic key sizes of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits
Advisory
– Notification of significant new trends or developments regarding the threat to the information system of an organization . This notification may include analytical insights into trends, intentions, technologies, or tactics of an adversary targeting information systems .