C Flashcards

1
Q

Callback

A

A procedure for identifying a system that accessed an environment remotely. In a callback, the host system disconnects the caller and then dials… TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Capability

A

A capability outlines the objects a subject can access and the operations
the subject can carry out on the different objects. It indicates the access rights for a specific
subject; many times, the capability is in the form of a ticket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Capability maturity model integration (CMMI)

A

A process model that captures the organization’s maturity and fosters continuous improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certification

A

The technical evaluation of the security components and their compliance
for the purpose of accreditation. A certification process can use safeguard evaluation,
risk analysis, verification, testing, and auditing techniques to assess the appropriateness
of a specific system processing a certain level of information within a particular environment.
The certification is the testing of the security component or system, and the accreditation
is the approval from management of the security component or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Challenge/ response method

A

A method used to verify the identity of a subject
by sending the subject an unpredictable or random value. If the subject responds with
the expected value in return, the subject is authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ciphertext

A

Data that has been encrypted and is unreadable until it has been converted
into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Clark-Wilson model

A

An integrity model that addresses all three integrity goals:
prevent unauthorized users from making modifications, prevent authorized users from
making improper modifications, and maintain internal and external consistency
through auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Classification

A

A systematic arrangement of objects into groups or categories according
to a set of established criteria. Data and resources can be assigned a level of
sensitivity as they are being created, amended, enhanced, stored, or transmitted. The
classification level then determines the extent to which the resource needs to be controlled
and secured, and is indicative of its value in terms of information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cleartext

A

In data communications, cleartext is the form of a message or data which
is transferred or stored without cryptographic protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud computing

A

The use of shared remote computing devices for the purpose of providing improved efficiencies, performance, reliability, stability, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Collusion

A

Two or more people working together to carry out a fraudulent activity.
More than one person would need to work together to cause some type of destruction
or fraud; this drastically reduces its probability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Communication security

A

y Controls in place to protect information as it is being

transmitted, especially by telecommunications mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compartment

A

A class of information that has need-to-know access controls beyond
those normally provided for access to confidential, secret, or top-secret information.
A compartment is the same thing as a category within a security label. Just because
a subject has the proper classification, that does not mean it has a need to know. The
category, or compartment, of the security label enforces the subject’s need to know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compensating controls

A

Controls that are alternative procedures designed to reduce

the risk. They are used to “counterbalance” the effects of an internal control weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Compromise

A

A violation of the security policy of a system or an organization such
that unauthorized disclosure or modification of sensitive information occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer fraud

A

Computer-related crimes involving deliberate misrepresentation,
modification, or disclosure of data in order to compromise a system or obtain
something of value.

17
Q

Confidentiality

A

A security principle that works to ensure that information is not
disclosed to unauthorized subjects.

18
Q

Configuration management

A

The identification, control, accounting, and documentation
of all changes that take place to system hardware, software, firmware, supporting
documentation, and test results throughout the lifespan of the system.

19
Q

Confinement

A

Controlling information in a manner that prevents sensitive data
from being leaked from a program to another program, subject, or object in an unauthorized
manner.

20
Q

Contingency plan

A

A plan put in place before any potential emergencies, with the
mission of dealing with possible future emergencies. It pertains to training personnel,
performing backups, preparing critical facilities, and recovering from an emergency or
disaster so that business operations can continue.

21
Q

Control zone

A

The space within a facility that is used to protect sensitive processing
equipment. Controls are in place to protect equipment from physical or technical unauthorized
entry or compromise. The zone can also be used to prevent electrical waves
carrying sensitive data from leaving the area.

22
Q

Copyright

A

A legal right that protects the expression of ideas.

23
Q

Cost/ benefit analysis

A

An assessment that is performed to ensure that the cost of a
safeguard does not outweigh the benefit of the safeguard. Spending more to protect an asset
than the asset is actually worth does not make good business sense. All possible safeguards must be evaluated to ensure that the most security-effective and cost-effective
choice is made.

24
Q

Countermeasure

A

A control, method, technique, or procedure that is put into place
to prevent a threat agent from exploiting a vulnerability. A countermeasure is put into
place to mitigate risk. Also called a safeguard or control.

25
Q

Covert channel

A

A communications path that enables a process to transmit information
in a way that violates the system’s security policy

26
Q

Covert storage channel

A

A covert channel that involves writing to a storage location
by one process and the direct or indirect reading of the storage location by another
process. Covert storage channels typically involve a resource (for example, sectors
on a disk) that is shared by two subjects at different security levels.

27
Q

Covert timing channel

A

A covert channel in which one process modulates its system
resource (for example, CPU cycles), which is interpreted by a second process as
some type of communication.

28
Q

Cryptanalysis

A

The practice of breaking cryptosystems and algorithms used in encryption
and decryption processes.

29
Q

Cryptography

A

The science of secret writing that enables storage and transmission
of data in a form that is available only to the intended individuals.

30
Q

Cryptology

A

The study of cryptography and cryptanalysis

31
Q

Cryptosystem

A

The hardware or software implementation of cryptography.