B Flashcards

1
Q

Back door

A

An undocumented way of gaining access to a computer system. After a system is compromised, an attacker may load a program that listens on a port (back door) so that the attacker can enter the system at any time. A back door is also referred to as a trapdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Back up

A

Copy and move data to a medium so that it may be restored if the original data is corrupted or destroyed. A full backup copies all the data from the system to the backup medium. An incremental backup copies only the files that have been modified since the previous backup. A differential backup backs up all files since the last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baseline

A

The minimum level of security necessary to support and enforce a security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bell-LaPadula model

A

The model uses a formal state transition model that describes its access controls and how they should perform. When the system must transition from one state to another, the security of the system should never be lowered or compromised. (See also multilevel security, simple security property, and star property (*-property).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biba model

A

A formal state transition system of computer security policy that describes a set of access control roles designed to ensure data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometrics

A

When used within computer security, identifies individuals by physiological characteristics, such as a fingerprint, hand geometry, or pattern in the iris.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blacklist

A

A set of known bad resources such as IP addresses, domain names, or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Browsing

A

Searching through storage media looking for specific information without necessarily knowing what format the information is in. A browsing attack is one in which the attacker looks around a computer system either to see what looks interesting or to find specific information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute-force attack

A

An attack that continually tries different inputs to achieve a predefined goal, which can be used to obtain credentials for unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business impact analysis (BIA)

A

A functional analysis in which a team collects data, documents business functions, develops a hierarchy of business functions, and applies a classification scheme to indicate each individual function’s criticality level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly