Vocabulary1 Flashcards

(500 cards)

1
Q

availability

A

ensures that information is available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Coaxial

A

network cabling that has an inner copper core separated by an insulatro from a metallic braid or shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

live forensics

A

Live forensics Taking a binary image of physical memory, gathering details about running processes, and gathering network connection data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CPPT

A

Continuity Planning Project Team?A team comprised of stakeholders within an organization that focuses on identifying who would need to play a role if a specific emergency event were to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDL

A

Interface Definition Language?Used by CORBA objects to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Constrained user interface

A

Presents a user with limited controls on information, such as an ATM keypad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data owner

A

A management employee responsible for ensuring that specific data is protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

circumstantial evidence

A

evidence that serves to establish the circumstances related to particular points or even other evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BCP

A

business continuity plan: long-term plan to ensure the continuity of business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

baselining

A

the process of captureing a point-in-time understanding of the current system security configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Database view

A

The result of a database query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

method

A

Method The function performed by an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Diffusion

A

The order of the plaintext should be dispersed in the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

lumen

A

Lumen The amount of light one candle creates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

honeypot

A

Honeypot A system designed to attract attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

circuit-level proxy

A

proxy firewall that operates at layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

COM

A

Component Object Model: locates and connects objects locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decryption

A

Converts a ciphertext into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Consistency testing

A

See Checklist testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Artificial Intelligence

A

science of programming electronic computers to “Think” more intelligently, sometimes mimicking the ability of mammal brains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

background check

A

verification of a persons background and experience; also called pre-employment screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CIRT

A

Computer Incident Response Team: team that performs incident handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DSSS

A

Direct Sequence Spread Spectrum?Uses the entire wireless band at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

link state

A

Link state Routing protocols that factor in additional metrics for determining the best route, including bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
agile software development
flexible software development model that eveolved as a reaction to rigid software development modes such as the waterfall model
15
Coupling
OOP concept that connects objects to others; highly coupled objects have low cohesion.
15
entitlements
Entitlements The permissions granted to a user.
16
knowledge base
Knowledge base Expert system component that consists of ?if/then? statements.
16
mesh
Mesh Physical network topology that interconnects network nodes to each other.
17
bottom-up programming
starts with lo-level technical implementation details and works up to the concept of the completed program
18
ad hoc mode
802.11 peer-to-peer mode with no central AP
18
graham-denning model
Graham?Denning model Has three parts: objects, subjects, and rules; it provides a more granular approach for interaction between subjects and objects.
19
entrapment
Entrapment A legal defense where the defendant claims an agent of law enforcement persuaded the defendant to commit a crime that he or she would otherwise not have committed.
20
genetic programming
Genetic programming Creating entire software programs (usually in the form of Lisp source code) via Darwinian evolution principles.
21
authorization
actions an individual can perform on a system
22
lattice-based access controls
Lattice-based access controls Nondiscretionary access control with defined upper and lower bounds implemented by the system.
23
Black box software testing
gives the tester no internal details; the software is treated as a black box that receives inputs
23
Caller ID
identifies the calling phone number; sometimes used as a weak authentication method
23
FDDI
FDDI Fiber Distributed Data Interface?Legacy LAB technology that uses light.
24
E3
16 E1s.
25
fitness function
Fitness function Genetic algorithm concept that assigns a score to an evolved algorithm.
26
Control unit
CPU component that acts as a traffic cop, sending instructions to the ALU.
26
EAP-FAST
EAP?Flexible Authentication via Secure Tunneling?Designed by Cisco to replace LEAP.
27
802.11i
first 802.11 wireless security standard that provides reasonable security
27
DAD
Disclosure, Alteration, and Destruction?The opposite of confidentiality, integrity, and availability.
27
entity integrity
Entity integrity Requires that each tuple has a unique primary key that is not null.
28
bluetooth
802.15 networking, a PAN wireless technology
29
Depth of field
The area that is in focus.
30
Binary image
bit-level copy of memory
30
DAC
Discretionary Access Control?Gives subjects full control of objects they have been given access to, including sharing the objects with other subjects.
31
bytecode
machine-indecednet interpreted code, used by Java
32
ARM
asynchronous Response Mode: HDLC mode where secondary nodes may initiate communication with the primary
32
baseline
uniform ways to implement a safeguard; an administrative control
32
Data warehouse
A large collection of data.
32
Database
A structured collection of related data.
32
full disclosure
Full disclosure The controversial practice of releasing vulnerability details publicly.
33
combinatorial software testing
black box testing method that seeks to identify and test all unique combinations of software inputs
34
DCE
Data Circuit-Terminating Equipment?A device that networks DTEs, such as a router.
35
BGP
Border Gateway Protocol: routing protocol used on the internet
35
MPLS
MPLS Multiprotocol Label Switching?Provides a way to forward WAN data via labels.
36
facial scan
Facial scan Biometric control compares a picture of a face to pictures stored in a database.
37
Impact
The severity of damage, sometimes expressed in dollars (value).
38
Dictionary attack
Password cracking method that uses a predefined list of words, like a dictionary, running each word through a hash algorithm.
40
ADSL
Asymmetric Digital Subscriber Line--DSL featuring faster download speeds than upload
41
COBIT
Control Objectives for Information and Related Technology: a control framework for employing information security governance best practices w/in an org
42
genetic algorithms
Genetic algorithms Creating computer algorithms via Darwinian evolution principles.
43
IKE
Internet Key Exchange?Manages the IPsec encryption algorithm.
44
Diskless workstation
Computer systems that contains CPU, memory, and firmware but no hard drive; type of thin client.
44
DNS
Domain Name System?A distributed global hierarchical database that translates names to IP addresses, and vice versa.
45
Copyright
Type of intellectual property that protects the form of expression in artistic, musical, or literary works.
46
IPv6 autoconfiguration
IPv6 autoconfiguration Autoconfiguration of a unique IPv6 address, omitting the need for static addressing or DHCP.
47
clipper chip
(failed) 1993 Escrowed Encryption Standard (EES) which used the skipjack algorithm
48
Direct evidence
Testimony provided by a witness regarding what the witness actually experienced.
49
Context-dependent access control
Adds additional criteria beyond identification and authentication; the context of the access, such as time.
49
IGP
Interior Gateway Protocol.
50
mirroring
Mirroring Complete duplication of data to another disk, used by some levels of RAID.
52
ARPAnet
predecessor to the Internet
52
Clearance
determinateino, typically made by a senior security professional, about whether or not a user can be trusted with a specific level of information
52
fraggle attack
Fraggle attack Smurf attack variation that uses UDP instead of ICMP.
52
MAC (Access Control)
MAC (access control) Mandatory Access Control?System-enforced access control based on subjects? clearances and objects? labels.
53
Bell-LaPadula
security model focused on maintaining the confidentiality of objects
54
Distance vector
Routing protocol that uses a simple metric, such as hop count.
55
minutiae
Minutiae Specific fingerprint details that include whorls, ridges, bifurcation, and others.
56
CCM
Capability maturity model: maturity framework for evaluating and improving the software development process
56
DDL
Data Definition Language?Used to create, modify, and delete tables.
56
Develop the contingency planning policy statement.
First step of the NIST SP 800?34 contingency planning process.
56
hebern machines
Hebern machines Class of cryptographic devices known as rotor machines, includes Enigma and SIGABA.
57
Diffie?Hellman key agreement protocol
Key agreement that allows two parties to securely agree on a symmetric key via a public channel with no prior key exchange.
58
Contraband check
Seeks to identify objects that are prohibited from entering a secure perimeter (such as an airplane).
59
hacktivist
Hacktivist Hacker activist; someone who attacks computer systems for political reasons.
61
authroization creep
occurs when employees not only maintain old access rights but also gain new ones as they move from one division to another within an organization
62
asymmetric encryption
encryption that uses 2 keys--one to encrypt, one to decrypt
62
Ethics
Ethics Doing what is morally right.
63
Integration Testing
Integration testing Testing multiple software components as they are combined into a working system.
64
HDLC
HDLC High-Level Data Link Control?The successor to SDLC.
65
Callback
modem-based authentication system
67
application layer proxy
proxy firewall that operates up to layer 7
67
lock picking
Lock picking The art of unlocking a lock without a key.
69
"Bad" blocks/clusters/sectors
good disk blocks marked as bad
70
buffer overflow
condition where an attacker can insert data beyond the end of a buffer variable
70
Hierarchical database
Hierarchical database Database that forms a tree.
71
AES
Advanced Encryption Standard: block cipher using 128- 192- or 256-bit keys to encrypt 129-bit blocks of data
72
CPU
Central Processing Unit?The ?brains? of the computer, capable of controlling and performing mathematical calculations.
73
color of law
acting on the authority of law enforcement
74
administrative Controls
implemented by creating and following organizational policy, procedure, or regulation; also called directive controls
75
BS-25999
continuity standard by the British Standards Institute
76
book cipher
cyptographic method that uses whole words from a well-known text such as a dictionary as a one-to-one replacement for plaintext
77
Conduct the Business impact Analysis (BIA)
second step of NIST SP 800-34 contingency planning process
77
Defense in depth
Application of multiple safeguards that span multiple domains to protect an asset.
77
Heresay
Hearsay Second-hand evidence.
78
Degaussing
Destroying the integrity of the magnetization of the storage media, making the data unrecoverable.
79
Data link layer
Layer 2 of the OSI model; handles access to the physical layer as well as local area network communication.
80
IPv6
IPv6 Internet Protocol version 6, the successor to IPv4?IPv6 features far larger address space, simpler routing, and simpler address assignment.
81
first sale doctrine
First sale doctrine Allows a legitimate purchaser of copyrighted material to sell it to another person.
82
Inheritance
Inheritance Objects inherit capabilities from their parent class.
84
BCP/DRP project manager
the key POC for ensuring that a BCP/DRP is not only completed but routinely tested
85
CHAP
challenge Handshake Authentication Protocol: a more secure network authentication protocol that uses a shared secret
85
FDE
FDE Full Disk Encryption?Also called whole disk encryption.
85
hubrid attack
Hybrid attack Password attack that appends, prepends, or changes characters in words from a dictionary.
86
flash memory
Flash memory A specific type of EEPROM, used for small portable disk drives.
87
full backup
Full backup An archive of all files.
88
fiber optic network cable
Fiber optic network cable Uses light to carry information.
88
footcandle
Footcandle One lumen per square foot.
89
MTTR
MTTR Mean Time to Repair?Describes how long it will take to recover a failed system.
90
CSIRT
Computer Security Incident Response Team?The group that is tasked with monitoring, identifying, and responding to security incidents.
91
Cipher
a cryptographic algorithm
92
enrollment
Enrollment The process of enrolling with a system (such as a biometric authentication system), creating an account for the first time.
93
GAN
GAN Global Area Network?A global collection of WANs.
94
legal liability
Legal liability Liability enforced through civil law.
95
compartmentalization
technical enforcement of need to know
96
Cryptography
Science of creating messages whose meaning is hidden.
97
analog
communication that sends a continuous wave of information
97
Cohesion
OOP concept that describes an independent object; objects with high cohesion have low coupling
97
DES
Data Encryption Standard?A symmetric block cipher using a 56-bit key and 64-bit block size.
98
\* Integrity Axiom
\* Integrity axiom Biba property that states ?no write up.?
99
Cryptographic protocol governance
Describes the process of selecting the right cipher and implementation for the right job.
99
EF
Exposure Factor?The percentage of value an asset lost due to an incident.
100
CMP
crisis management plan
100
IDS
Intrusion Detection System?A detective technical control.
100
ISAKMP
ISAKMP Internet Security Association and Key Management Protocol?Manages the IPsec Security Association process.
101
confidentiality
seeks to prevent the unauthorized disclosure of information
101
full knowledge
Full knowledge test A penetration test where the tester is provided with inside information at the start of the test.
102
Clark-Wilson model
real-world integrity model that protects integrity by having subjects access objects via programs
103
bridge
layer 2 device that has two ports and connnects network segments together
103
Interpreted code
Interpreted code Code that is compiled on the fly each time the program is run.
104
MAN
MAN Metropolitan Area Network?Typically confined to a city, a Zip Code, or a campus or office park.
105
Biba
security model focused on maintaining the integrity of objects
105
COOP
Continuity Of Operations Plan?A plan to maintain operations during a disaster.
105
Diameter
Successor to RADIUS; designed to provide an improved authentication, authorization, and accounting (AAA) framework.
106
boot sector virus
virus that infects the boot sector of a PC; the virus loads upon system startup
107
hash function
Hash Function One-way encryption using an algorithm and no key.
108
ANN
artificial Neural Networks: networks that simulate neural networks found in humans and animals
109
HIDS
HIDS Host-based intrusion detection system?A detective technical control.
109
MIC
MIC Message Integrity Check?Integrity protocol used by WPA2.
109
MODEM
Modem Modulator/demodulator?Takes binary data and modulates it into analog sound that can be carried on phone networks.
110
collection limitation principle
OECD privacy guideline principle that states that personal data collection should have limits and that data should be obtained in a lawful manner with the individuals knowledge and approval
110
hot site
Hot site A backup site with all necessary hardware and critical applications data mirrored in real time.
111
Inference Engine
Inference engine Expert system component that follows the tree formed by the knowledge base and fires a rule when there is a match.
112
CORBA
Common Object Request Broker Architecture?An open, vendor-neutral networked object broker framework.
112
monolithic
Monolithic kernel A statically compiled kernel.
113
EGP
Exterior Gateway Protocol.
115
Active-active cluster
involves multiple systems, all of which are online and actively processing traffic or data
116
Differential backup
An archive of any files that have been changed since the last full backup was performed.
116
keyboard
Keyboard unit The external keyboard.
117
ABM
Asynchronous Balanced Mode: HDLC combined mode where nodes may asct as primary or secondary initiaint transmissions w/o receiving permission
118
BRP
business recovery plan: details steps required to restore normal business operations after recovering from a disruptive event. Aka business resumption plan
119
IRC
IRC Internet Relay Chat?A global network of chat servers and clients.
121
Bayesian filtering
uses mathematicla formulas to assign probabilities to make decisions such as identifying spam
121
Covert channe
l Any communication that violates security policy.
121
DSL
Digital Subscriber Line?Uses existing copper pairs to provide digital service to homes and small offices.
122
MTU
MTU Maximum Transmission Unit?The maximum PDU size on a network.
124
802.11b
Wireless standard 11 Mbps 2.4 GHz
125
MTD
MTD Maximum Tolerable Downtime?The total time a system can be inoperable before an organization is severely impacted.
126
CIRP
Cypber Incident Response Plan: plan designed to respond to disruptive cyber events, including network-based attacks, worms, computer viruses, Trojan Horses, etc
127
Dynamic password
Password that changes at regular intervals.
128
IP
IP Internet Protocol; includes IPv4 and IPv6.
128
ISO/IEC-27031
ISO/IEC-27031 Draft business continuity guideline that is part of the ISO 27000 series.
129
MAC (telecommunications)
MAC (telecommunications) Media Access Control?Layer 2 protocol that transfers data to and from the physical layer.
131
commandments of computer ethics
the computer ethics institute code of ethics
132
Chinese wall model
model designed to avoid conflicts of interest by prohibiting one person, such as a consultant, from accessinng multiple conflight of Interest categories
132
Database replication
Mirrors a live database, allowing simultaneous reads and writes to multiple replicated databases by clients.
132
exfiltration
Exfiltration Policy-violating removal of sensitive data from a secure perimeter.
133
ECPA
Electronic Communications Privacy Act?Provides search and seizure protection to non-telephony electronic communications.
134
magnetic stripe card
Magnetic stripe card Passive device that contains no circuits; sometimes called swipe cards because they are swiped through a card reader.
135
baseband
network with one channel; can only send one signal at a time
137
ARCNET
attached Resource Computer Network: legacy LAN technology that uses tokens
138
Chaining
Block cipher mechanism that seeds the previous encrypted block into the next block to be encrypted
140
Civil Law
law that resolves disputes between individuals or organizations
141
Internet Layer
Internet layer TCP/IP model layer that aligns with the Layer 3 of the OSI model and describes IP addresses and routing.
143
CIDR
Classless Inter-Domain Routing: allows for many network sizes beyond the arbitraty stateful network sizes
144
BCI
business Continuity Institute
145
MOR
MOR Minimum Operating Requirements?Describes the minimum environmental and connectivity requirements in order to operate computer equipment.
146
layering
Layering Separates hardware and software functionality into modular tiers.
147
EOC
EOC Emergency Operations Center?The command post established during or just after an emergency event.
148
CSU/DSU
Channel Service Unit/Data Service Unit?DCE device.
149
Agents of law enforcement
private citizens carrying out actions on behalf of law enforcement
150
high availability cluster
High availability cluster Multiple systems that can be seamlessly leveraged to maintain the availability of the service or application being provided; also called a failover cluster.
152
COCOM
committee for multilateral export control: munitiions law that was in effect from '47-'94. Designed to control export of criticial technologies (including crypto) to Iron Curtain countries
153
Executive Session planning
Executive succession planning Determining an organization?s line of succession.
154
CSRF
Cross-Site Request Forgery?Third-party redirect of static content within the security context of a trusted site.
155
encapsulation (network)
Encapsulation (network) Takes information from a higher network layer and adds a header to it, treating the higher layer information as data.
156
faraday cage
Faraday cage Shields enclosing objects from EMI.
158
configuration management
process of developing a consistnet system security confiruration that can be leveraged throughout an organization
158
ITIL
ITIL Information Technology Infrastructure Library?A framework for providing best services in IT service management.
159
maintenance hook
Maintenance hook Shortcut installed by system designers and programmers to allow developers to bypass normal system checks during development.
160
feedback
Feedback Stream cipher mechanism that seeds the previous encrypted bit into the next bit to be encrypted.
162
Criminal law
Law where the victim can be seen as society itself.
164
Define the classes of gates
I: residential gate designed for home use II: commercial, such as a parking garage gate III: Industril/limited access such as a large loading dock IV: Restrictued access such as prison or airport
164
L2F
L2F Layer 2 Forwarding?Designed to tunnel PPP.
166
botnet
central bot command and control network managed by humans referred to as bot herders
167
ACL
Access control list
168
EAPOL
EAP Over LAN?A Layer 2 protocol for varying EAP.
170
clipping level
minimum reporting threshold level
170
L2TP
L2TP Layer 2 Tunneling Protocol?Combines PPTP and L2F.
172
Access control matrix
table defining what access permissions exist between specific subjects and objects
173
Computer bus
primary communication channel on a computer system
174
802.11g
Wireless standard 54 Mbps 2.4 GHz
175
DBA
Database Administrator?Person responsible for the installation, configuration, upgrade, administration, monitoring, and maintenance of databases.
176
Code of Ethics Canons
1. 2. Act honorably, honestly, justly, responsibly, and legally 3. 4. Advance and protect the profession
178
Change managemnt
the process of understanding, communicazting, and documenting changes
179
Customary law
Customs or practices that are so commonly accepted by a group that the custom is treated as a law.
180
ACK
TCP flag--acknowledge received data
181
compiler
converts source code, suce as C or Basic, and compiles it into machine code
182
Identification
Association of an individual.
183
hypervisor mode
Hypervisor mode Allows guests to operate in ring 0, controlled by a hypervisor in ring ??1.?
183
mandatory leave
Mandatory leave Forcing staff to take vacation or time away from the office; also known as forced vacation.
184
Initial
Initial Phase 1 of CMM.
185
Eradication
Eradication phase Incident response phase that cleans a compromised system.
187
Data mining
Used to search for patterns, such as fraudulent activity, in a data warehouse.
189
awareness
security control designeed to change user behavior
190
expert systems
Expert systems Seeks to replicate the knowledge and decision-making capability of human experts.
191
administrative law
law enacted by gov't agencies, aka regulatory law
192
FTP
FTP File Transfer Protocol?Used to transfer files to and from servers.
194
common criteria
an internatinoally agreed upon standard for describing and testing the security of IT products
195
attribute
a column in a relational database table
195
EAP-TLS
EAP?Transport Layer Security?Uses PKI, requiring both server-side and client-side certificates.
196
GFS
GFS Grandfather?Father?Son?A backup rotation method.
197
Iris Scan
Iris scan Passive biometric scan of the iris (colored portion of the eye).
198
EAP Extensible Authentication Protocol
?A Layer 2 authentication framework that describes many specific authentication protocols.
198
emanations energy
Emanations Energy that escapes an electronic system and may be remotely monitored under certain circumstances.
199
enticement
Enticement Making the conditions for commission of a crime favorable for those already intent on breaking the law.
201
ALU
arithmetic logic unit: CPU component that performs mathematical calculations
203
Best practice
a consensus of the best way to protect the confidentiality, integrity, and availability of assets
204
CBC
cipher Block Chaining: a block mode of DS that XORs the previous encrypted block of ciphertext to the next block ofplaintext to be encrypted
205
Data dictionary
Contains a description of the database tables, including the schema, database view information, and information about authorized database administrator and user accounts.
206
Due diligence
The management of due care.
206
hacker
Hacker Controversial term that may mean explorer or someone who maliciously attacks systems.
207
managed mode
Managed mode 802.11 mode that clients use to connect to an AP.
208
Integrity
Integrity Seeks to prevent unauthorized modification of information.
209
Machine code
Machine code Software that is executed directly by the CPU.
210
Ethernet
Ethernet Dominant local area networking technology that transmits network data via frames.
211
Keyboard dynamics
Keyboard dynamics Biometric control that refers to how hard a person presses each key and the rhythm by which the keys are pressed.
213
allocated space
portions of a disk partition that are marked as actively containing data
213
Due care
Requires that key organizational stakeholders are prudent in carrying out their duties, aka the ?prudent man rule.?
214
backdoor
a shortcut in a systme that allows a user to bypass security checks
216
Cryptology
The science of secure communications.
217
Cipher Disk
cryptographic device that uses two concentric disks, each with an alphabet around the periphery
218
HAVAL
HAVAL Hash of Variable Length?A hash algorithm that creates message digests of 128, 160, 192, 224, or 256 bits in length using three, four, or five rounds.
219
Enigma
Enigma Rotor machine used by German Axis powers during World War II.
220
half duplex
Half duplex Sends or receives at one time only (not simultaneously), like a walkie-talkie.
221
broadband
network with multiple channles; can send multiple signals at a time, like cable tv
223
client-side attaks
attack where a user downloads malicious content
224
Intellectual property
Intellectual property Intangible property that resulted from a creative act.
225
ISM
ISM Industrial, Scientific, and Medical?Wireless bands set aside for unlicensed use.
226
bollard
post designed to stop a car, typically deployed in front of buildings
227
EPROM
EPROM Erasable programmable read-only memory?Memory that may be erased with ultraviolet light.
228
HTTPS
HTTPS Hypertext Transfer Protocol Secure?HTTP using SSL or TLS.
229
lock bumping
Lock bumping Attack on locks using a shaved key, which bumps the pins, allowing the lock to turn.
231
Digital
Communication that transfers data in bits: ones and zeroes.
232
CISC
Complex Instruction Set Computer: CPU instructions that are longer and more powerful
233
Kerberos
Kerberos A third-party authentication service that may be used to support single sign-on.
234
microkernels
Microkernels A modular kernel.
236
compensatory damages
damages provides as compensation
237
LCP
LCP Link Control Protocol?The initial unauthenticated connection used by CHAP.
238
DBMS
Database Management System?Controls all access to the database and enforces database security.
238
Directory path traversal
Escaping from the root of a Web server (such as /var/www) into the regular file system by referencing directories such as ?../..?.
238
E1
Dedicated 2.048-megabit circuit that carries 30 channels.
238
Identify preventive controls
Third step of the NIST SP 800?34 contingency planning process.
240
accreditation
the data owner's acceptance of the risk represented by a system
240
Computer Fraud and Abuse Act
title 18 US Code Section 1030
241
Dual-homed host
Host with two network interfaces: one connected to a trusted network, and the other connected to an untrusted network.
242
harrison-ruzzo-ullman model
Harrison?Ruzzo?Ullman model Maps subjects, objects, and access rights to an access matrix. It is considered a variation of the Graham?Denning model.
243
Instance
Instance One copy of an object.
244
Cable Modem
provide internet access via broadband cable TV
245
Hold down timer
Hold-down timer Distance vector routing protocol safeguard that avoids flapping.
247
Cryptanalysis
The science of breaking encrypted messages (recovering their meaning).
248
Individual participation principle
OECD privacy guideline principle that states that individuals should have control over their data.
249
Crossover
Genetic algorithm concept that combines two algorithms.
250
Cybersquatting
Registering Internet domain names associated with another organization?s intellectual property.
251
collusion
an agreement betweeen two or more individuals to subvert the security of a system
252
hardcopy data
Hardcopy data Any data that is accessed through reading or writing on paper rather than processing through a computer system.
253
monoalphabetic
Monoalphabetic cipher Substitution cipher using one alphabet.
254
cold site
back up site with raised floor, power, utilities, and phyusical security and no configured systems or data
254
Field of view
Field of view The entire area viewed by a camera.
255
Caesar Cipher
a Rot-3 substitution cipher
255
Ciphertext
an encrypted message
256
EU Data Protection Directive
EU Data Protection Directive Privacy directive that allows for the free flow of information while still maintaining consistent protections of each member nation?s citizen?s data.
257
DCOM
Distributed Component Object Model?Locates and connects objects across a network.
258
KDC
KDC Key Distribution Center?A Kerberos service that authenticates principals.
259
firewall
Firewall Device that filters traffic based on Layer 3 (IP addresses) and Layer 4 (ports).
261
All pairs testing
aka pairwise testing
261
broadcast
traffic that is sent to all stations on a LAN
262
CSMA
Carrier Sense Multiple Access?A method used by Ethernet networks to allow shared usage of a baseband network and avoid collisions.
263
Develop an IT contingency plan
. Fifth step of the NIST SP 800?34 contingency planning process.
264
GIG
GIG Global Information Grid?The U.S. DoD global network, one of the largest private networks in the world.
265
asset
a resource that is valuable to an organization and must be protected
266
Detective controls
Controls that alert during or after a successful attack.
268
CCMP
Counter Mode CBC MAC protocol: used by WPA2 to create a MIC
270
closed source
software released in executable form; the source code is kept confidential
271
multicast
Multicast One-to-many network traffic, where the ?many? is preselected.
272
encapsulation (object)
Encapsulation (object) Contains and hides the details of an object?s method.
273
Application Layer
layer 7 of OSI model: where the user interfaces with the computer application -- OR -- TCP/IP model that combines layer 5-7 of OSI model
275
Chain of Custody
requires that, once evidence is acquired, full documentation be maintained regarding what the evidence is, who handled the evidence, when the evidence was handled, and where the evidence was handled
276
ephemeral
Ephemeral ports TCP/IP ports 1024 and higher.
277
encryption
Encryption Converts the plaintext to a ciphertext.
278
LAN
LAN Local Area Network?A comparatively small network, typically confined to a building or an area within one.
279
hybrid risk analysis
Hybrid risk analysis Combines quantitative and qualitative risk analysis.
281
Deadbolt
A rigid locking mechanism that is held in place by a key and prevents a door from being opened or fully closed when extended.
283
blowfish
block cipher using from 32- through 448-bit (default is 128) keys to encypt 64 bits of data
284
ECB
Electronic Code Book mode?The simplest and weakest mode of DES.
285
common law
legal system that places significant emphasis on particular cases and judicial precedent as a determinant of laws
285
Deterrent controls
Controls that deter users from performing actions on a system.
286
malware
Malware Malicious software, or any type of software that attacks an application or system.
287
Develop recovery strategies
. Fourth step of the NIST SP 800?34 contingency planning process.
288
FRR
FRR False Reject Rate?Occurs when an authorized subject is rejected as invalid; also known as a type I error.
290
Abstraction
hide unnecessary details from the user
292
extranet
Extranet A connection between private Intranets.
293
MD5
MD5 Message Digest 5?A hash function that creates a 128-bit message digest.
295
CCTV
Closed-Circuit TV: a detective device used to aid guards in detecting the presence of intruders in restricted areas
296
Cracker
A black hat hacker.
298
bus
physical network topology that connects network nodes in a string
298
CASE
computer Aided Software Engineering: uses programs to assist in the creation and maintenance of other ocmputer programs
299
ESP
ESP Encapsulating Security Payload?IPsec protocol that primarily provides confidentiality by encrypting packet data.
301
FIdM
FIdM Federated Identity Management?Applies single sign-on at a much wider scale, ranging from cross-organization to Internet scale.
302
ATM
asynchronous Transfer Mode: WAN technology that uses fixed length cells
304
CWR
Congestion Window Reduced?New TCP flag.
305
HMAC
HMAC Hashed Message Authentication Code?Provides integrity by combining symmetric encryption with hashing.
305
IMAP
Internet Message Access Protocol?An email client protocol.
305
Intranet
Intranet A privately owned network running TCP/IP.
307
Differential cryptanalysis
Seeks to find the difference between related plaintexts that are encrypted.
308
ARO
Annual Rate of Occurrence: the numgber of losses suffered per year
309
802.11n
wireless standard 144 Mbps 2.4/5 GHz
310
Ipsec
IPsec Internet Protocol Security?A suite of protocols that provide a cryptographic layer to both IPv4 and IPv6.
311
HIPAA
HIPAA Health Insurance Portability and Accountability Act?U.S. regulation that protects the privacy of healthcare information.
313
BRI
basic Rate interface: provides 2 64-K digital ISDN channels
315
Certificate Authority
PKI component that authenticatews the identity of a person or organization before issuring a certificate to them
316
FHSS
FHSS Frequency Hopping Spread Spectrum?Uses a number of small-frequency channels throughout the wireless band and ?hops? through them in pseudorandom order.
318
firmware
Firmware Stores small programs that do not change frequently, such as a computer?s BIOS.
319
collision
two or more plaintexts that share the same hash
320
Dumpster diving
A physical attack in which a person recovers trash in hopes of finding sensitive information that has been merely discarded in whole rather than being destroyed.
321
black hat
unethical hacker or researcher
323
DNS reflection attack
Spoofed DoS attack using third-party DNS servers.
324
ITSEC
ITSEC Information Technology Security Evaluation Criteria?The first successful international evaluation model.
325
Classful addresses
Ipv4 networks in classes A through E
327
4GL
Fourth generation programming language designed to increase programmer's efficiency by automating the cation of computer programming code
328
DRAM
Dynamic Random Access Memory?Stores bits in small capacitors (like small batteries); less expensive but slower than SRAM.
328
Dynamic signatures
Biometric control that measures the process by which someone signs his or her name.
330
Bot
computer system running malware that is controlled by a botnet
332
Detection phase
Incident response phase that analyzes events in order to determine whether they might comprise a security incident.
333
802.1x
port-based network access control, layer 2 authentication
334
DoS
Denial of Service?An attack on availability.
336
DDoS
Distributed Denial of Service?An availability attack using many systems.
338
Disassembler
Attempts to convert machine language into assembly.
339
ECE
Explicit Congestion Notification Echo?New TCP flag.
340
DARPA
Defense Advanced Research Projects Agency.
341
CRL
Certificate Revocation List?PKI component that lists digital certificates that have been revoked.
342
EULA
EULA End-User License Agreement?A form of software licensing agreement.
343
logic bomb
Logic bomb A malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date.
345
Electronic backups
Electronic backups Data that is stored electronically and can be retrieved in case of a disruptive event or disaster.
347
gross negligence
Gross negligence The opposite of due care.
348
Digital signature
Provides non-repudiation, which includes authentication of the identity of the signer and proof of the document?s integrity.
349
ISO 17799
ISO 17799 A broad-based approach for information security code of practice by the International Organization for Standardization.
350
Centralized Access Control
concentrates access control in one logicla point for a system or crossover
351
MTBF
MTBF Mean Time Between Failures?Quantifies how long a new or repaired system will run on average before failing.
352
Demarc
Demarcation point, where the ISP?s responsibility ends and the customer?s begins.
353
CCD
Charge-Coupled Discharge: a digital CCTV
354
microwave motion detector
Microwave motion detector Active motion detector that uses microwave energy.
356
DNSSEC
Domain Name Server Security Extensions?Provides authentication and integrity to DNS responses via the use of public key encryption.
356
FAR
FAR False Accept Rate?Occurs when an unauthorized subject is accepted as valid; also known as a type II error.
357
Key lock
Key lock Preventive device that requires a physical key to unlock.
359
confusion
the relationship between the plaintext and ciphertext should be confused (or random) as possible
360
Data quality principle
OECD privacy guideline principle that states that personal data should be complete, accurate, and maintained in a fashion consistent with the purposes for the data collection.
361
DTE/DCE
Connection that spans the demarc.
363
DRP
Disaster Recovery Plan?A short-term plan to recover from a disruptive event.
365
CTR
Counter?A stream mode of DES that uses a counter for feedback.
366
BOOTP
Bootstrap Protocol: used for bootstrapping via a nweork by diskless systems
367
account lockout
disables an account after a set number of failed logins, sometimes during a specific time period
368
Database journal
A log of all database transactions; should a database become corrupted, the database can be reverted to a backup copy, and then subsequent transactions can be ?replayed? from the journal, restoring database integrity.
369
flat file
Flat file Text file that contains multiple lines of data, each in a standard format.
370
HTTP
HTTP Hypertext Transfer Protocol?A protocol to transmit Web data via a network.
371
Crippleware
Partially functioning proprietary software, often with key features disabled; the user is typically required to make a payment to unlock the full functionality.
372
assembly language
low-level computer programming language with instrucctionst hat are short mnemonics that match to machine language instructions
372
modes of operation
Modes of operation Dedicated, system-high, compartmented, and multilevel.
373
Content-dependent access control
Adds additional criteria beyond identification and authentication; the actual content the subject is attempting to access.
374
exigent circumstances
Exigent circumstances With respect to evidence acquisition, justification for the seizure of evidence without a warrant due to the extreme likelihood that the evidence will be destroyed.
375
authentication
proof of an identity claim
376
Certification
a detailed inspection that verifies whether a system meets the documented security requirements
377
foreign key
Foreign key A key in a related database table that matches a primary key in the parent database.
378
EAP-TTLS
EAP Tunneled Transport Layer Security?Simplifies EAP-TLS by dropping the client-side certificate requirement.
379
business interruption testing
partial or complete failover to an alternate site
380
DTE
Data Terminal Equipment?A network ?terminal,? such as a desktop, server, or actual terminal.
382
freeware
Freeware Software that is free of charge.
384
compensating controls
additional security controls put in place to compensate for weaknesses in other controls
385
mobile sites
Mobile sites DRP backup site option that is a ?data centers on wheels,? towable trailers that contain racks of computer equipment, as well as HVAC, fire suppression, and physical security.
386
Kernel
Kernel The heart of the operating system, usually running in ring 0; it provides the interface between hardware and the rest of the operating system, including applications.
387
IaaS
IaaS Infrastructure As A Service?Provides an entire virtualized operating system, which the customer configures from the OS on up.
389
hypervisor
Hypervisor Software or operating system that controls access between virtual guests and host hardware.
390
monitor mode
Monitor mode 802.11 read-only mode used for sniffing.
391
antivirus software
software desinged to prevent and detect malware infections
392
formal access approval
Formal access approval Documented approval from the data owner for a subject to access certain objects.
393
DML
Data Manipulation Language?Used to query and update data stored in the tables.
394
lux
Lux One lumen per square meter.
396
circuit-switched network
network that provides a dedicated circuit or channel between two nodes
398
HDSL
HDSL High-Data-Rate DSL?Matches SDSL speeds using two copper pairs.
399
Corroborative evidence
Evidence that provides additional support for a fact that might have been called into question.
400
Managed
Managed Phase 4 of CMM.
401
Database shadowing
Two or more identical databases that are updated simultaneously.
403
IDEA
International Data Encryption Algorithm?A symmetric block cipher using a 128-bit key and 64-bit block size.
404
linear cryptanalysis
Linear cryptanalysis Known plaintext attack where the cryptanalyst finds large amounts of plaintext/ciphertext pairs created with the same key.
405
closed system
system using proprietary hardware or software
405
EEPROM
Electrically Erasable Programmable Read-Only Memory?Electrically erasable memory via the use of a flashing program.
407
Big Bang Testing
integration testing that tests all integrated software components
409
Corrective controls
Controls that correct a damaged system or process.
410
BIOS
Basic Input/Output System: typically stored in firmware
412
GLBA
GLBA Gramm?Leach?Bliley Act?Requires financial institutions to protect the confidentiality and integrity of consumer financial information.
413
hub
Hub Layer 1 network access device that acts as a multiport repeater.
414
applet
small pieces of mobile code that are embedded in other software such as web browsers
415
multipart virus
Multipartite virus Virus that spreads via multiple vectors; also called multipart virus.
416
ActiveX controls
the functional equivalent of Java applets;' they use digital certificates instead of a sandbox to provide security
417
Defined
Phase 3 of CMM.
418
Continuity of support plan
Focuses narrowly on support of specific IT systems and applications.
419
aggregation
mathematical attack where a user is able to use lower level access to learn restricted information
421
full duplex
Full duplex Two-way simultaneous transmission, like two people having a face-to-face conversation.
422
AV
asset value: the value of a protected asset
423
hand geometry
Hand geometry Biometric control that uses measurements from within specific points on the subject?s hand.
424
Fingerprint scan
Fingerprint scan Biometric scan of the minutiae (specific details of the fingerprint).
425
middleware
Middleware Connects programs to programs.
427
Interrupt
Interrupt Indicates an asynchronous CPU event has occurred.
428
DMZ
Demilitarized Zone?Used to separate trusted from untrusted networks.
429
JSON
JSON JavaScript Object Notation?A data interchange format.
430
master mode
Master mode 802.11 mode used by APs.
431
access aggregation
the collective entitlementts granted by multiple systems to one user; can lead to authorization creep
432
Dynamic testing
Tests code while executing it.
433
Incremental backup
An archive of all files that have changed since the last backup of any kind was performed.
434
Checklist Testing
lists all necessary component required for successful recovery and ensures that they are, or will be, readily available should a disaster occur; also known as consistency testing
435
fair use doctrine
Fair use doctrine Allows someone to duplicate copyrighted material without requiring the payment, consent, or even knowledge of the copyright holder.
437
DHCP
Dynamic Host Configuration Protocol?Assigns temporary IP address leases to systems, as well as DNS and default gateway configuration.
438
active RFID
powered RFID tags that can operate via larger distances
440
backward chaining
expert system mode that starts with a premise and works backwards
441
Bastion host
any host placed on the internet that is not protected by another device
442
IPv4
IPv4 Internet Protocol version 4, commonly called IP?IPv4 is the fundamental protocol of the Internet.
443
Dual-factor authentication
See Strong authentication.
445
Acceptance Testing
testing to ensure that he software meets the customer's operational requirements
446
HTML
HTML Hypertext Markup Language?Used to display Web content.
447
MAC address
MAC address Layer 2 address of a NIC.
449
Installation testing
Installation testing Testing software as it is installed and first operated.
450
HIPS
HIPS Host-based Intrusion Prevention System?Preventive device that processes information within the host.
451
ALE
Annualized Loss Expectancy: the cost of loss due to a risk over a year
452
Convergence
All routers on a network agree on the state of routing.
453
802.11a
Wireless standard 54 Mbps using 5 GHz
454
brute force attack
attck that attemptst every possible key or combination
456
cache memory
the fastest memory on the system; required to keep up with the CPU as it fetches and executes instructions
457
Containment phase
Incident response phase that attempts to keep further damage from occurring as a result of the incident.
458
Internet
Internet A global collection of peered networks running TCP/IP.
460
Disaster
Any disruptive event that interrupts normal system operations.
462
Custodian
Provides hands-on protection of assets.
463
802.11
Wireless networking standard
464
DEA
Data Encryption Algorithm?Described by DES.
465
active-passive cluster
involves devices or systems that are already in place, configured, powered on, and ready to begin processing network traffic should a failure occur on the primary
466
Jefferson disks
Jefferson disks Cryptographic device invented by Thomas Jefferson that used multiple wheels, each with an entire alphabet along the ridge.
467
guideline
Guideline A recommendation; an administrative control.
469
fuzzing
Fuzzing A type of black box testing that enters random malformed data as inputs into software programs to determine if they will crash.
471
Best evidence rule
requires use of the strongest possible evidence
473
civil law (legal system)
legal system that leverages codified laws or statutes to determine what is considered within the bounds of law
474
LAND attack
LAND attack DoS attack that uses a spoofed SYN packet that includes the victim?s IP address as both source and destination.
476
Fetch and execute
Fetch and execute Mechanism that allows the CPU to receive machine language instructions and execute them; also called fetch, decode, execute, or FDX.
477
accountability principle
OECD privacy guideline principle that states indivisuald should have the right to challenge the content of any personal data being held and can update that data
478
accountability
holds individuals accountable for their actions
479
candidate keys
any attribute (column) in the table with unique values
480
free software
Free software Controversial term that is defined differently by different groups. ?Free? may mean free of charge, or ?free? may mean users are free to use the software in any way they would like, including modifying it.
481
mantrap
Mantrap A preventive physical control with two doors; each door requires a separate form of authentication to open.
482
CER
crossover error rate: Describes the point where the false reject rate (FRR) and False Acept Rate (FAR) are equal
483
memory
Memory Volatile or nonvolatile computer storage.
484
motherboard
Motherboard Contains computer hardware including the CPU, memory slots, firmware, and peripheral slots such as peripheral component interconnect (PCI) slots.
485
AH
Authentication Header--Ipsec protocol that provides authentication and integrity for each packet of network data
486
commit
makes changes to a database permenant
487
breach notification
notification of persons whose personal data has been, or is likely to have been, compromised
488
asynchronous dynamic token
authentication token that is not synchronized with a central server; includes challenge-response tokens
489
Inference
Inference Deductive attack where a user is able to use lower level access to learn restricted information.
490
CFB
Cipher Feedback: stream-mode DES that is similar to block mode CBC
491
electronic vaulting
Electronic vaulting Batch process of electronically transmitting data that is to be backed up on a routine, regularly scheduled time interval.
492
LLC
LLC Logical Link Control?Layer 2 protocol that handles LAN communications.
493
label
Label Security level assigned to an object, such as confidential, secret, or top secret.
494
Java
Java An object-oriented language used not only to write applets but also as a general-purpose programming language.
495
forward chaining
Forward chaining Expert system mode that starts with no premise and works forward to determine a solution.
496
IPS
IPS Intrusion Prevention System?A preventive device designed to prevent malicious actions.
497
brewer-nash model
same as chinese wall model
498
LEAP
LEAP Lightweight Extensible Authentication Protocol?A Cisco proprietary protocol released before 802.1X was finalized.
499
ISDN
ISDN Integrated Services Digital Network?Provides digital service via copper pair.
500
Domains of trust
Access control model used by Windows? Active Directory.