C-GLOSSARY Flashcards

1
Q

Capability Maturity Model Integration (CMMI)

A

Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc, immature processes, to disciplined, mature processes, with improved quality and effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Certificate (certification) authority (CA)

A

A trusted third party that serves authentication infrastructures or enterprises and registers entities and issues them certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Certificate revocation list (CRL)

A

An instrument for checking the continued validity of the certificates for which the certification authority (CA) has responsibility. The CRL details digital certificates that are no longer valid. The time gap between two
updates is very critical and is also a risk in digital certificates verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certification practice statement

A

A detailed set of rules governing the certificate authority’s operations. It provides an understanding of the value and trustworthiness of certificates issued by a given certificate authority (CA).
Stated in terms of the controls that an organization observes, the method it uses to validate the authenticity of certificate applicants and the CA’s
expectations of how its certificates may be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Chain of custody

A

A legal principle regarding the validity and integrity of evidence. It requires accountability for anything that will be used as evidence in a legal proceeding to ensure that it can be accounted for from the time it was
collected until the time it is presented in a court of law. This includes documentation as to who had access to the evidence and when, as well as the ability to identify evidence as being the exact item that was recovered
or tested. Lack of control over evidence can lead to it being discredited.
Chain of custody depends on the ability to verify that evidence could not have been tampered with. This is accomplished by sealing off the evidence, so it cannot be changed, and providing a documentary record of
custody to prove that the evidence was, at all times, under strict control and not subject to tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Chain of evidence

A

A process and record that shows who obtained the evidence, where and when the evidence was obtained, who secured the evidence, and who had control or possession of the evidence. The “sequencing” of the chain of evidence follows this order: collection and identification, analysis, storage, preservation, presentation in court, return to owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Challenge/response token

A

A method of user authentication that is carried out through use of the Challenge Handshake Authentication Protocol (CHAP). When a user tries
to log onto the server using CHAP, the server sends the user a “challenge,”which is a random value. The user enters a password, which is used as an encryption key to encrypt the “challenge” and return it to the server.
The server is aware of the password. It, therefore, encrypts the “challenge”value and compares it with the value received from the user. If the values
match, the user is authenticated. The challenge/response activity continues throughout the session and this protects the session from password
sniffing attacks. In addition, CHAP is not vulnerable to “man-in-the middle” attacks because the challenge value is a random value that changes on each access attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Change management

A

A holistic and proactive approach to managing the transition from a current to a desired organizational state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Checksum

A

A mathematical value that is assigned to a file and used to “test” the file at a later date to verify that the data contained in the file have not been maliciously changed.
A cryptographic checksum is created by performing a complicated series of mathematical operations (known as a cryptographic algorithm) that translates the data in the file into a fixed string of digits called a hash
value, which is then used as the checksum. Without knowing which cryptographic algorithm was used to create the hash value, it is highly unlikely that an unauthorized person would be able to change data without inadvertently changing the corresponding checksum.
Cryptographic checksums are used in data transmission and data storage. Cryptographic
checksums are also known as message authentication codes, integrity check values, modification detection codes or message integrity codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Chief information officer (CIO)

A

The most senior official of the enterprise who is accountable for IT advocacy, aligning IT and business strategies, and planning, resourcing and managing the delivery of IT services, information and the deployment
of associated human resources. In some cases, the CIO role has been expanded to become the chief knowledge officer (CKO) who deals in knowledge, not just information. Also see chief technology officer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Chief information security officer (CISO)

A

Responsible for managing information risk, the information security program, and ensuring appropriate confidentiality, integrity and availability of information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Chief security officer (CSO)

A

Typically responsible for physical security in the organization although increasingly the CISO and CSO roles are merged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Chief technology officer (CTO)

A

The individual who focuses on technical issues in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud computing

A

An approach using external services for convenient on-demand IT operations using a shared pool of configurable computing capability.
Typical capabilities include :-
infrastructure as a service (IaaS),
platform asa service (PaaS)
software as a service (SaaS) (e.g., networks, servers,
storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
This cloud model is composed of five essential characteristics (on-demand self-service, ubiquitous network access, location independent resource
pooling, rapid elasticity, and measured service).
It allows users to access technology-based services from the network cloud without knowledge of, expertise with, or control over, the technology infrastructure that supports them and provides four models for enterprise access (private cloud,
community cloud, public cloud and hybrid cloud).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common vulnerabilities and exposures (CVE)

A

A system that provides a reference method for publicly known information-security vulnerabilities and exposures.
MITRE Corporation maintains the system, with funding from the National Cyber Security Division of the United States Department of Homeland Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compensating control

A

An internal control that reduces the risk of an existing or potential control weakness resulting in errors and omissions

17
Q

Computer forensics

A

The application of the scientific method to digital media to establish factual information for judicial review. This process often involves investigating computer systems to determine whether they are or have been used for illegal or unauthorized activities.
As a discipline, it combines elements of law and computer science to collect and analyze data from information systems (e.g., personal computers, networks, wireless communication and digital storage devices) in a way that is admissible as evidence in a court of law.

18
Q

Content filtering

A

Controlling access to a network by analyzing the contents of the incoming and outgoing packets and either letting them pass or denying them based
on a list of rules. Differs from packet filtering in that it is the data in the packet that are analyzed instead of the attributes of the packet itself (e.g., source/target IP address, transmission control protocol [TCP] flags).

19
Q

Contingency plan

A

A plan used by an organization or business unit to respond to a specific systems failure or disruption

20
Q

Continuous monitoring

A

The process implemented to maintain a current security status for one or more information systems or for the entire suite of information systems on which the operational mission of the enterprise depends.
The process includes:
1) the development of a strategy to regularly
evaluate selected IS controls/metrics,
2) recording and evaluating IS relevant events and the effectiveness of the enterprise in dealing with those events
3) recording changes to IS controls, or changes that affect IS risks.
4) publishing the current security status to enable information sharing decisions involving the enterprise

21
Q

Control

A

The means of managing risk, including policies, procedures, guidelines, practices or organizational structures which can be of an administrative, technical, management or legal nature.

22
Q

Control center

A

Hosts the recovery meetings where disaster recovery operations are managed.

23
Q

Controls policy

A

A policy defining control operational and failure modes (e.g., fail secure, fail open, allowed unless specifically denied, denied unless specifically permitted).

24
Q

Corporate governance

A

The system by which enterprises are directed and controlled. The board of directors is responsible for the governance of their enterprise. It consists of the leadership and organizational structures and processes that ensure the enterprise sustains and extends strategies and objectives.

25
Q

COSO

A

Committee of Sponsoring Organizations of the Treadway Commission. Its report “Internal Control–Integrated Framework” is an internationally
accepted standard for corporate governance.
See www.coso.org.

26
Q

Cost-benefit analysis

A

A systematic process for calculating and comparing benefits and costs of a project, control or decision.

27
Q

Countermeasures

A

Any process that directly reduces a threat or vulnerability.

28
Q

Criticality

A

A measure of the impact that the failure of a system to function as required will have on the organization

29
Q

Criticality analysis

A

An analysis to evaluate resources or business functions to identify their importance to the organization, and the impact if a function cannot be completed or a resource is not available.

30
Q

Cryptographic algorithm

A

A well-defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.

31
Q

Cryptographic strength

A

A measure of the expected number of operations required to defeat a cryptographic mechanism.

32
Q

Cryptography

A

The art of designing, analyzing and attacking cryptographic schemes.

33
Q

Cyclical redundancy check (CRC)

A

A method to ensure that data have not been altered after being sent through a communication channel.