700 Flashcards
A notification that an unusual condition exists and should be investigated.
alert
The series of steps/formula/process that is followed to arrive at a result.
algorithm
The component or process that analyzes the data collected by the sensor.
analyzer
A calculation that is used to identify risks and calculate the expected loss each year.
annual loss expectancy (ALE)
A calculation of how often a threat will occur.
annualized rate of occurrence (ARO)
The act of looking for variations from normal operations (anomalies) and reacting to them.
anomaly detection
Authentication that doesn’t require a user to provide a username - password - or any other identification before accessing resources.
anonymous authentication
A category of software that uses various methods to prevent and eliminate viruses in a computer.
antivirus
The core program that runs the virus-scanning process.
antivirus engine
Software that identifies the presence of a virus and is capable of removing or quarantining the virus.
antivirus software
A networking capability included with all Macintosh Computers.
AppleTalk
A freestanding device that operates in a largely self-contained manner.
appliance
The seventh layer of the OSI model. This layer deals with how applications access the network and describes application functionality - such as file transfer - messaging - and so on.
Application layer
An abstract interface to the services and protocols provided by an operating system.
Application Programming Interface (API)
A virus that is protected in a way that makes disassembling it difficult.
armored virus
Any resource of value.
asset
Any unauthorized intrusion into the normal operations of a computer or computer network.
attack
Files that hold information about a resource’s access by users.
audit files
The act of tracking resource usage by users.
auditing
Individuals involved in auditing log and security files.
auditors
Verifying that the logs and other resources collected are legitimate.
authenticating the evidence
The means of verifying that someone is who they say they are.
authentication
The time period during which a resource can be accessed.
availability
An opening left in a program application (usually by the developer) that allows additional access to data.
backdoor
Originally created as a support tool - it is now well known as an illicit server program that can be used to gain access to Windows NT/2000 servers and take control.
Back Orifice
A copy of data made to removable media.
backup
A documented plan governing backup situations.
backup plan
A written policy detailing the frequency of backups and the location of storage media.
backup policy
A model designed for the military to address the storage and protection of classified information. The model prevents the user from accessing information that has a higher security rating than they are authorized to access. It also prevents information from being written to a lower level of security.
Bell La-Padula model
A set of rules governing basic operations.
best practices
A device that can authenticate an individual based on a physical characteristic.
biometric device
The science of identifying a person by using one or more of their features. This can be a thumbprint - a retina scan - or any other biological trait.
biometrics
A probability method of finding similar keys in MD5.
birthday attack
A type of symmetric block cipher created by Bruce Schneier.
Blowfish
Also known as the Master Boot Record (MBR). The first sector of the hard disk - where the program that boots the operating system resides. It’s a popular target for viruses.
boot sector
A protocol predominantly used by ISPs that allows routers to share information about routes with each other.
Border Gateway Protocol (BGP)
A router used to translate from LAN framing to WAN framing.
border router
A type of attack that relies purely on trial and error.
brute force attack
A type of DoS attack that occurs when more data is put into a buffer than it can hold - thereby overflowing it (as the name implies.)
buffer overflow attack
A contingency plan that will allow a business to keep running in the event of a disruption to vital resources.
Business Continuity Planning (BCP)