Chapter 5 Flashcards
Application Server
computer responsible for hosting applications to user workstations
Asymmetric Encryption
algorithm using one key to encrypt and different key to decrypt the input plaintext
Checksum
digit representing the sum of the correct digits in a piece of stored or transmitted digital data
Ciphertext
altered form of plaintext message so its unreadable for anyone except intended recipients
Configuration Management
process and discipline used to ensure only changes made to a system are those that have been authorized and validated
Cryptography
study or applications of methods to secure or protect the meaning and content of messages, files, or other information
Data Loss Prevention (DLP)
system capabilities designed to detect and prevent unauthorized use and transmission of information
Decryption
Reverse process of encryption
Degaussing
process of erasing data on disk or tape, when performed
Egress monitoring
Monitoring of outgoing network traffic
Digital Signature
provides the services of origin authentication, data integrity, and signer non-repudiation
Encryption
process of converting a message from plaintext to ciphertext
Encryption System
Total set of algorithms, processes, hardware, software and procedures that provide encryption and decryption capability
Hardening
Process of applying secure configurations and locking down various hardware, communications systems, software, operating systems, web server, application server, application, etc.
Hash Function
algorithm that computes a numerical value on a data file or electronic message used to represent that file or message and depends on the entire contents of the file or message
Hashing
process of using mathematical algorithm against data to product a numeric value that is representative of that data
Ingress monitoring
monitoring of incoming network traffic
Message digest
digital signature that uniquely identifies data and has the property such that changing a single bit in the data will cause a completely different digest to be generated
Operating System
software “master control application” that runs the computer
Patch
Software component, that, when installed, directly modified files or device settings related to a different software component without changing the version number or release details for related software component
Patch Management
systematic notification, identification, deployment, installation, and verification of operating system and application software code revisions
Plaintext
message or data in its natural format and in readable form, extremely vulnerable
Records Retention
practice based on records lifecycle, according to which records are retained if necessary, and then destroyed after appropriate time interval has elapsed
Remanence
residual information remaining on storage media after clearing
Request for Change (RFC)
first stage in change management, where a change in procedure or product is sought by a stakeholder