Chapter 3 Flashcards
Systems engineering activities intended to deter and/or delay exploitation of critical technologies in a system in order to impede countermeasure development, unintended technology transfer, or alteration of a system.
Anti-tamper (AT)
A chronological record of system activities, which includes records of system accesses and operations performed in a given period.
Audit Log
An individual entry in an audit log related to an audited event.
Audit Record
A chronological record that reconstructs and examines the sequence of activities surrounding or leading to a specific operation, procedure, or event in a security-relevant transaction from inception to final result.
Audit Trail
A record showing who has accessed an information technology (IT) system and what operations the user has performed during a given period.
Audit Trail
To confirm the identity of an entity when that identity is presented.
Authenticate
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Authentication
A security measure designed to protect a communication system against acceptance of fraudulent transmission or simulation by establishing the validity of a transmission, message, originator, or a means of verifying an individual’s eligibility to receive specific categories of information.
Authentication
A copy of files and programs made to facilitate recovery, if necessary.
Backup
A software and/or hardware product that is commercially ready-made and available for sale, lease, or license to the general public.
Commercial-off-the-shelf (COTS)
Establishment of and charter for a group of qualified people with responsibility for the process of controlling and approving changes throughout the development and operational lifecycle of products and systems; may also be referred to as a change control board.
Configuration Control Board
An aggregation of information system components that is designated for configuration management and treated as a single entity in the configuration management process.
Configuration Item
Item or aggregation of hardware, software, or both, which is designated for configuration management and treated as a single entity in the configuration management process.
Configuration Item
A collection of activities focused on establishing and maintaining the integrity of information technology products and information systems, through control of processes for initializing, changing, and monitoring the configurations of those products and systems throughout the system development life cycle.
Configuration Management
The set of parameters that can be changed in hardware, software, or firmware that affect the security posture and/or functionality of the information system.
Configuration Settings
Management policy and procedures used to guide an enterprise response to a perceived loss of mission capability.
Contingency Plan
Information security strategy integrating people, technology, and operation capabilities to establish variable barriers across multiple layers and missions of the organization.
Defense-in-depth
The cryptographic transformation of data to produce ciphertext.
Encryption
Communications encryption in which data is encrypted when being passed through a network, but routing information remains visible.
End-to-end Encryption
Safeguarding information in an information system from point of origin to point of destination.
End-to-end Security
The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function.
Least Privilege
A determination within the executive branch in accordance with directives issued pursuant to this order that a prospective recipient requires access to a specific classified information in order to perform or assist in a lawful and authorized governmental function.
Need-to-know
Protection against an individual falsely denying having performed a particular action.
Non-repudiation
Provides the capability to determine whether a given individual took a particular action such as creating information, sending a message, approving information, and receiving a message.
Non-repudiation
A security-focused description of an information system, its operational policies, classes of users, interactions between the system and its users, and the system’s contribution to the operational mission.
Security Concept of Operations
A suite of specifications that standardize the format and nomenclature by which software flaw and security configuration information is communicated, both to machines and humans.
Security Content Automation Protocol (SCAP)
An occurrence (e.g., and auditable event or flag) considered to have potential security implications to the system or its environment that may require further action (such as noting, investigating, or reacting).
Security-relevant Event
Based on Department of Defense policy and security controls, an implementation guide geared to a specific product and version.
Security Technical Implementation Guide (STIG)
Contains all requirements that have been flagged as applicable for the product which have been selected on a DoD baseline.
Security Technical Implementation Guide (STIG)
Always keep the problem and solution spaces separate.
Security Engineering Principle to Avoid Inefficiency