A Flashcards

1
Q

Access

A

A subject’s ability to view, modify, or communicate with an object. Access enables the flow of information between the subject and the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control

A

Mechanisms, controls, and methods of limiting access to resources to authorized subjects only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control List (ACL)

A

A list of subjects that are authorized to access a particular object. Typically, the types of access are read, write, execute, append, modify, delete, and create.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control Mechanism

A

Administrative, physical, or technical control that is designed to detect and prevent unauthorized access to a resource or environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accountability

A

A security principle indicating that individuals must be held responsible for their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accredited

A

A computer system or network that has received official authorization and approval to process sensitive data in a specific operational environment. There must be a security evaluation of the system’s hardware, software, configurations, and controls by technical personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Add-on security

A

Security protection mechanisms that are hardware or software retrofitted to a system to increase that system’s protection level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Administrative controls

A

Security mechanisms that are management’s responsibility and referred to as “soft” controls. These controls include the development and publication of policies, standards, procedures, and guidelines; the screening of personnel; security-awareness training; the monitoring of system activity; and change control procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Aggregation

A

The act of combining information from separate sources of a lower classification level that results in the creation of information of a higher classification level, which the subject does not have the necessary rights to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIC/ CIA triad

A

The three security principles: availability, integrity, and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Annualized loss expectancy (ALE)

A

A dollar amount that estimates the loss potential from a risk in a span of a year. ~~~~~ Single Loss Expectancy (SLE) x Annualized rate of occurrence (ARO) = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antimalware

A

Software whose principal functions include the identification and mitigation of malware; also known as antivirus, although this term could be specific to only one type of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Annualized rate of occurrence (ARO)

A

The value that represents the estimated possibility of a specific threat taking place within a one-year timeframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Assurance

A

A measurement of confidence in the level of protection that a specific security control delivers and the degree to which it enforces the security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attack

A

An attempt to bypass security controls in a system with the mission of using that system or compromising it. An attack is usually accomplished by exploiting a current vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Audit trail

A

A chronological set of logs and records used to provide evidence of a system’s performance or activity that took place on the system. These logs and records can be used to attempt to reconstruct past events and track the activities that took place, and possibly detect and identify intruders.

17
Q

Authenticate

A

To verify the identity of a subject requesting the use of a system and/or access to network resources. The steps to giving a subject access to an object should be identification, authentication, and authorization.

18
Q

Authorization

A

Granting access to an object after the subject has been properly identified and authorized.

19
Q

Availability

A

The reliability and accessibility of data and resources to authorized individuals in a timely manner.