C(s) Flashcards

1
Q

Cable modem

A

Provide Internet access via broadband cable TV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cache memory

A

The fastest memory on the system, required to keep up with the CPU as it fetches and executes instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Caesar Cipher

A

A rot-3 substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Callback

A

Modern-based authentication system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Caller ID

A

Identifies the calling phone number, sometimes used as a weak authentication method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Candidate keys

A

Any attribute (column) in the table with unique values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CMM

A

Capability Maturity Model, a maturity framework for evaluating and improving the software development process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CSMA

A

Carrier Sense Multiple Access, a method used by Ethernet networks to allowed shared usage of a baseband network, and avoid collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CASE

A

Computer-aided software engineering, uses programs to create assist in the creation and maintenance of other computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CBC

A

Cipher Block Chaining , a block mode of DES that XORs the previous encrypted block of cipher-text to the next block plaintext to be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CCD

A

Charged Couple Discharge, a digital CCTV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CCMP

A

Counter Mode CBC MAC Protocol, used by WPA2 to create a MIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CCTV

A

Closed Circuit Television, a detective device used to aid guards in in detecting the presence of intruders in restricted areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CDN

A

Content Distribution Networks (also Content Delivery Networks) use a series of distributed caching servers to improve performance and lower the latency of downloaded online content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CPU

A

Central Processing Unit, the “brains” of the computer, capable of controlling and performing mathematical calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Centralized access control

A

Concentrates Access control in one logical point for a system or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CER

A

Crossover error rate, describes the point where the false reject rate(FRR) and false accept rate(FAR) are equal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Certificate Authority

A

PKI component that authenticates the identity of a person or organization before issuing a certificate to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CRL

A

Certificate Revocation Lists, PKI component which lists digital certificates that have been revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Certification

A

A detailed inspection that verifies whether a system meets the documented security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CFB

A

Cipher Feedback, a stream mode DES that is similar to block-mode CBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Chain of custody

A

Requires that once evidence is acquired, full documentation regarding who, what, when, and where evidence was handled is maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Chaining

A

Block cipher mechanism that seeds the previous Encrypted block into the next block to be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CHAP

A

Challenge Handshake Authentication Protocol, a more secure network authentication protocol that uses a shared secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Change management

A

The process of understanding, communicating , and documenting changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CSU/DSU

A

Channel Service Unit/Data Service Unit, DCE device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Checklist testing

A

Lists all necessary components required for successful recovery, and ensures that they are, or will be , readily available should a disaster occur. Also known as consistency testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CIA triad

A

Confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CIDR

A

Classless Inter-Domain Routing, allows for many network sizes beyond the arbitrary state-full network sizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cipher

A

A cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Cipher disk

A

Cryptographic device that uses two concentric disks each with alphabet around the periphery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Ciphertext

A

An encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Circuit-level proxy

A

Proxy firewall that operates at Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Circuit-switched network

A

Network that provides a dedicated circuit or channel between two nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Circumstantial evidence

A

Evidence that serves to establish the circumstances related to particular points or even other evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CIRT

A

Computer Incident Response Team, a team that performs incident handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CISC

A

Complex Instruction Set Computer, CPU instructions that are longer and more powerful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Civil law

A

Law that resolves disputes between individuals or organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Civil law (legal system)

A

Legal system that leverages codified laws or statutes to determine what is considered within the bounds of law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Clark-Wilson

A

Real-world integrity model that protects integrity by having subjects access objects via programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Class I gate

A

Residential gate designed for home use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Class II gate

A

Commercial gate, such as a parking garage gate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Class III gate

A

Industrial/limited access gate, such as a large loading dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Class IV gate

A

Restricted access gate, used at an airport or prison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Classful addresses

A

IPv4 Networks in classes A through E

46
Q

Clearance

A

A determination, typically made by a senior security professional, about whether or not a user can be trusted with a specific level of information

47
Q

Client-side attacks

A

Attack where a user downloads malicious content

48
Q

Clipper Chip

A

(Failed) 1993 Escrowed Encryption Standard (EES), which used the Skipjack algorithm

49
Q

Clipping level

A

A minimum reporting threshold level

50
Q

Closed source

A

Software released in executable form: the source code is kept confidential

51
Q

Closed system

A

System using proprietary hardware or software

52
Q

CMP

A

Crisis Management Plan

53
Q

Coaxial

A

Network cabling that has an inner copper core separated by an insulator from a metallic braid or shield

54
Q

COBIT

A

Control Objectives for Information and related Technology, a control framework for employing information security governance best practices within an organization

55
Q

COCOM

A

Committee for Multilateral Export Controls, a munitions law which was in effect from 1947 to 1994. It was designed to control the export of critical technologies (including cryptography) to “Iron Curtain” countries during the Cold War

56
Q

Code Repositories

A

Secure service for storing source code of projects, a public example is GitHub

57
Q

Codebreakers(The)

A

David Kahn’s history of cryptography

58
Q

Cohesion

A

OOP concept that describes an independent object. Objects with high cohesion have low coupling

59
Q

Cold site

A

A backup site with raised floor, power, utilities, and physical security, and no configured systems or data

60
Q

Collection Limitation Principle

A

OECD Privacy Guideline Principle which states personal data collection should have limits, be obtained in a lawful manner, and, unless there is a compelling reason to the contrary, with the individuals knowledge and approval

61
Q

Collision

A

Two or more plaintexts that generate the same hash

62
Q

Collusion

A

An agreement between two or more individuals to subvert the security of a system

63
Q

Color of law

A

Acting on the authority of law enforcement

64
Q

COM

A

Component Object Model, locates, and connects objects locally

65
Q

Combinatorial software testing

A

Black box testing method that seeks to identify and test all unique combinations of software inputs

66
Q

Commandments of Computer Ethics

A

The Computer Ethnics Institute code of ethics

67
Q

Commit

A

Makes changes to a database permanent

68
Q

Common criteria

A

An internationally agreed upon standard for describing and testing the security of IT products

69
Q

CORBA

A

Common Object Request Broker Architecture, an open vendor-neutral networked object broker framework

70
Q

Compartmentalization

A

Technical enforcement of need to know

71
Q

Compensating Controls

A

Additional security controls put in place to compensate for weaknesses in other Controls

72
Q

Compensatory damages

A

Damages provides as compensation

73
Q

Compiler

A

Convert source code, such as C or Basic , and compile it into machine code

74
Q

Computer bus

A

The primary communication channel on a computer system

75
Q

Computer crimes

A

Crimes using computers

76
Q

Computer Fraud and Abuse Act

A

Title 18 United States Code Section 1030

77
Q

CSIRT

A

Computer Security Incident Response Team, the group that is tasked with monitoring, identifying, and responding to security incidents

78
Q

COTS

A

Commercial Off-the-Shelf Software, third-party developed commercial software available to the general public

79
Q

BIA

A

Conduct the business impact analysis (BIA) second step of the NIST SP 800-34 contingency planning process

80
Q

Confidentiality

A

Seeks to prevent the unauthorized disclosure of information

81
Q

Configuration management

A

The process of developing a consistent system security configuration that can be leveraged throughout an organization

82
Q

Confusion

A

The relationship between the plaintext and cipher-text should be as confused (or as random) as possible

83
Q

Containment phase

A

Incident response phase that attempts to keep further damage from occurring as a result of the incident

84
Q

Content-dependent Access control

A

Adds additional criteria beyond identification and authentication: the actual content the subject is attempting to access

85
Q

Context-dependent Access control

A

Adds additional criteria beyond identification and authentication: the context of the access, such as time

86
Q

COOP

A

Continuity of Operations Plan, a plan to maintain operations during a disaster

87
Q

Continuity of Support Plan

A

Focuses narrowly on a support of specific IT systems and applications

88
Q

CPPT

A

Continuity planning project team, a team comprised of stakeholders within an organization and focuses on identifying who would need to play a role if a specific emergency event were to occur

89
Q

Contraband check

A

Seek to identify objects that are prohibited to enter a secure perimeter (such as an airplane)

90
Q

Control Unit

A

CPU component that acts as a traffic cop, sending instructions to the ALU

91
Q

Convergence

A

All routers on a network agree on the state of routing

92
Q

Corrective Comtrols

A

Controls that correct a damaged system or process

93
Q

Corroborative evidence

A

Evidence that provides additional support for a fact that might have been called into question

94
Q

CTR

A

Counter, a stream mode of DES that uses a counter for feedback

95
Q

Coupling

A

OOP concept that connects objects to others. Highly coupled objects have low cohesion

96
Q

Covert channel

A

Any communication that violates security policy

97
Q

Cracker

A

A black hat hacker

98
Q

Criminal law

A

Law where the victim can be seen as society itself

99
Q

Crippleware

A

Partially functioning proprietary software, often with key features disabled. The user is typically required to make a payment to unlock the full functionality

100
Q

Crossover

A

Genetic algorithm concept that combines two algorithms

101
Q

Cross-site scripting

A

Or XSS , third-party execution of web scripting languages such as JavaScript within the security context of a trusted site

102
Q

Cryptanalysis

A

The science of breaking encrypted messages (recovering their meaning)

103
Q

Cryptographic Protocol governance

A

Describes the process of selecting the right cipher and implementation for the right job

104
Q

Cryptography

A

Science of creating messages whose meaning is hidden

105
Q

Crypytology

A

The science of secure communication

106
Q

CSRF

A

Cross-site request forgery, third-party redirect of static content within the security context of a trusted site

107
Q

Custodian

A

Provides hands-on protection of assets

108
Q

Customary law

A

Customs or practices that are so commonly accepted by a group that the custom is treated as a law

109
Q

CWR

A

New TCP flag, congestion window reduced

110
Q

Cyber Incident response plan

A

Plan designed to respond to disruptive cyber events , including network-based attacks, worms, computer viruses, Trojan horses

111
Q

Cybersquatting

A

Registering internet domain names associated with another organization’s intellectual property