Unit 10 Flashcards
access controller
A component used by the security manager to check permissions
belonging to classes.
action (in a policy file)
In Java, the part of an entry in a policy file that describes the
kinds of action that may be performed with respect to some target.
application domain
A domain containing less privileged (non-system domain)
classes in a protection domain.
application gateway
A kind of firewall providing a proxy service.
asymmetric cryptography
A code in which the encoding key is different from the decoding key, but is related to it in a non-trivial way (an example of this is public key
cryptography).
audit log
A record of the activity on a system that can be used to determine what users have done and to assist recovery in the case of an attack.
auditing
Capturing a secure record of security-related events for non-repudiation, recovery and proof of effectiveness.
authentication (identification)
The process of determining a user’s or software’s identity.
authorisation
The process of determining what code is allowed to do, according to how it is signed, what code base it comes from or what caller it is associated with (for example, what user invoked it).
availability
The property of a system that can be used when it is needed by an authorised user or application.
block cipher
A cipher in which encryption takes place on blocks of plaintext.
brute-force attack
An attack in which possible keys are attempted until a correct one is found.
buffer overflow
The error that occurs when a buffer is assigned more data than it should hold.
certifying authority
An organisation that issues a certificate associating a user with a cryptographic key.
challenge
A method of authorisation in which the user is presented with a question or other task whose successful completion helps to determine their identity.
checksum
A number used to check the integrity of a message.
cipher
A code, a means of encrypting plaintext.
ciphertext
The output of a cipher.
click fraud
The fraudulent generation of clicks in order to profit from cost-per-click web pages.
code base
The location of code in terms of its URL.
collision
A collision occurs in a hash function when two or more inputs generate the same output.
confidentiality
The property of a system that ensures that data is visible only to authorised users.
credentials
Security information associated with a subject, such as keys or passwords.
cryptanalysis
The science of decoding ciphers.