ACRONYMS Flashcards

1
Q

PDCA

A

Plan
Do
Check
Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISMS

A

information security management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Integrity

A

hashing that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

STRIDE

A
Spoofing
Tampering
Repudiation
Information disclosure
Denial of service
Elevation of privilege 

Microsoft threat modeling / categorization - used in assessing threats against networks and / or O/S’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PASTA

A

Process for Attack Simulation and Threat Analysis.

PASTA is a risk-centric approach to THREAT MODELING countermeasures in relation to the value of the assets being protected.

Seven steps - each step / stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VAST

A

Visual
Agile
Simple Threat

THREAT MODEL based on Agile development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DREAD

A
Damage potential
Reproducibility
Exploitability
Affected users
Discoverability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST

A

National Institute of Standards and Technology (NIST)

is charged with the security management of all federal government computer systems that ARE NOT USED to process SENSITIVE national security information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDEAL

A

Initiate

Diagnose

Evaluate

Act

Learn

= software development life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SW-CMM, CMM opr SCMM

A

Software Capability Security Model

I
R
D
M 
O
Initial
Repeatable
Defined
Managed - quantitative measures utilized
Optimizing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RDBMS

A

Relational Database Management System

A relational database = two-dimensional tables made up of rows and columns.

Tables = relation
Row = tuple
Column = field
# of rows in RDBMS = cardinality
# of columns in RDBMS = degree

3 Keys > to identify records
Candidate Keys = identify any record
Foreign Keys = two tables
Primary Keys = identify records in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RDBMS

ACID model

A

All database transactions

Atomicity —> if any part of transaction fails the entire trans must be rolled back

Consistency –> database must be consistent before / after

Isolation –> each transaction should be isolated

Durability –> committed transactions must be preserved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly