Various Flashcards
A hidden software-access mechanism that will bypass normal security controls to grant access into the program
Trapdoor
Work tasks and data processing that were lost by a disaster, disruption, or failure
Lost work in process (LWIP)
A shared connection used in common by other devices
Bus
Level of permission granted to individual user for reading data, writing data, or executing specific programs
Access rights
Samples collected by the auditor to prove or disprove the audit findings
Audit evidence
Older term for the building that houses the data center
Information processing facility (IPF)
The initial loading of software to start a computer
Boot strapping, also known as initial program load (IPL)
Matching the combined security of subject (user or program), object (data), and context of usage (need or purpose) to determine whether the request should be approved or denied
Attribute-based access control (ABAC)
A unique serial number burned into the network interface card by the manufacturer. The address operates in the Data-Link layer (layer 2) of the OSI model.
Media Access Control (MAC) address
Test run by software quality assurance to check the system security mechanisms by exploiting known vulnerabilities
Penetration testing
What is it called when the auditor places restrictions on the nature, use, or content of their findings? The audit may have encountered problems in scope, time, thoroughness of tests, or content of available evidence.
Qualified opinion
What is the list of objectives, tasks in sequence, skills matrix, written procedures, written test procedures, and forecast illustrating scope, time, and cost estimates?
Audit plan
This is the most restrictive level of access that grants users the minimum amount of access to perform their jobs.
Least privilege
Technique used by programmers in computer software to disable the functionality of the program based on a specific date
Time bomb
What is the term used to describe the development of well-defined specifications while ensuring adherence to those specifications?
Quality. Quality starts during initial design with the gathering of specifications. Quality originates in the beginning, not by postinspection after the product (or service) is created.
A type of audit to determine whether internal controls are present and functioning effectively
Compliance audit
What is an attack that has not been seen before called?
Zero-day attack
Which access control model allows the system owner to establish access privileges to the system?
Discretionary access control (DAC)
What is the term for a continuous threat of breach through electronic attacks?
Persistent electronic threat
What is the purpose of the chain of custody, and why is it so important when you are collecting evidence?
The chain of custody ensures control in the preservation of evidence. It ensures that extra care is taken not to alter or taint the sample.
The protection of information held in secret for the benefit of authorized users
Confidentiality
An attempt to overpower the system or attempt every possible combination until access is granted
Brute-force attack
Information synonymous with public records or unprotected data that is accessible by anyone
Unclassified
What is it called when you manage a series of individual projects to create an ongoing operation, also known as a functional support program?
Program management