CISSP CBK Glossary Flashcards
6to4
Transition mechanism for migrating from IPv4 to IPv6. It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network.
A Checklist Test
Copies of the plan are handed out to each functional area for examination to ensure the plan properly deals with the area’s needs and vulnerabilities.
A Cold Site
Is just a building with power, raised floors, and utilities. No devices are available. This is the cheapest of the three options, but can take weeks to get up and operational.
A Full-Interruption Test
One in which regular operations are stopped and processing is moved to the alternate site.
A Hot Site
Fully configured with hardware, software, and environmental needs. It can usually be up and running in a matter of hours. It is the most expensive option, but some companies cannot be out of business longer than a day without very detrimental results.
A Parallel Test
One in which some systems are actually run at the alternate site.
A Reciprocal Agreement
One in which a company promises another company it can move in and share space if it experiences a disaster, and vice versa. Reciprocal agreements are very tricky to implement and are unenforceable.
A Simulation Test
A practice execution of the plan takes place. A specific scenario is established, and the simulation continues up to the point of actual relocation to the alternate site.
A Structured Walk-Through Test
Representatives from each functional area or department get together and walk through the plan from beginning to end.
A Warm Site
Does not have computers, but it does have some peripheral devices, such as disk drives, controllers, and tape drives. This option is less expensive than a hot site, but takes more effort and time to become operational.
Absolute Addresses
Hardware addresses used by the CPU.
Abstraction
The capability to suppress unnecessary details so the important, inherent properties can be examined and reviewed.
Accepted Ways for Handling Risk
Accept, transfer, mitigate, avoid.
Access
The flow of information between a subject and an object.
Access Control Matrix
A table of subjects and objects indicating what actions individual subjects can take upon individual objects.
Access Control Model
An access control model is a framework that dictates how subjects access objects.
Access Controls
Are security features that control how users and systems communicate and interact with other systems and resources.
Accreditation
Formal acceptance of the adequacy of a system’s overall security by management.
Active Attack
Attack where the attacker does interact with processing or communication activities.
ActiveX
A Microsoft technology composed of a set of OOP technologies and tools based on COM and DCOM. It is a framework for defining reusable software components in a programming language independent manner.
Address Bus
Physical connections between processing components and memory segments used to communicate the physical memory addresses being used during processing procedures.
Address Resolution Protocol (ARP)
A networking protocol used for resolution of network layer IP addresses into link layer MAC addresses.
Address Space Layout Randomization (ASLR)
Memory protection mechanism used by some operating systems. The addresses used by components of a process are randomized so that it is harder for an attacker to exploit specific memory vulnerabilities.
Algebraic Attack
Cryptanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions.
Algorithm
Set of mathematical and logic rules used in cryptographic functions.
Analog Signals
Continuously varying electromagnetic wave that represents and transmits data.
Analytic Attack
Cryptanalysis attack that exploits vulnerabilities within the algorithm structure.
Annualized Loss Expectancy (ALE)
Annual expected loss if a specific vulnerability is exploited and how it affects a single asset. SLE * ARO = ALE.
Application Programming Interface (API)
Software interface that enables process-to-process interaction. Common way to provide access to standard routines to a set of software programs.
Arithmetic Logic Unit (ALU)
A component of the computer’s processing unit, in which arithmetic and matching operations are performed.
AS/NZS 4360
Australia and New Zealand business risk management assessment approach.
Assemblers
Tools that convert assembly code into the necessary machine-compatible binary language for processing activities to take place.
Assembly Language
A low-level programming language that is the mnemonic representation of machine-level instructions.
Assurance Evaluation Criteria
Check-list and process of examining the security-relevant parts of a system (TCB, reference monitor, security kernel) and assigning the system an assurance rating.
Asymmetric Algorithm
Encryption method that uses two different key types, public and private. Also called public key cryptography.
Asymmetric Mode Multiprocessing
When a computer has two or more CPUs and one CPU is dedicated to a specific program while the other CPUs carry out general processing procedures.
Asynchronous Communication
Transmission sequencing technology that uses start and stop bits or similar encoding mechanism. Used in environments that transmit a variable amount of data in a periodic fashion.
Asynchronous Token Generating Method
Employs a challenge/response scheme to authenticate the user.
Attack Surface
Components available to be used by an attacker against the product itself.
Attenuation
Gradual loss in intensity of any kind of flux through a medium. As an electrical signal travels down a cable, the signal can degrade and distort or corrupt the data it is carrying.
Attribute
A column in a two-dimensional database.
Authentication Header (AH) Protocol
Protocol within the IPSec suite used for integrity and authentication.
Authenticode
A type of code signing, which is the process of digitally signing software components and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was digitally signed. Authenticode is Microsoft’s implementation of code signing.
Availability
Reliable and timely access to data and resources is provided to authorized individuals.
Avalanche effect
Algorithm design requirement so that slight changes to the input result in drastic changes to the output.
Base registers
Beginning of address space assigned to a process. Used to ensure a process does not make a request outside its assigned memory boundaries.
Baseband transmission
Uses the full bandwidth for only one communication channel and has a low data transfer rate compared to broadband.
Bastion host
A highly exposed device that will most likely be targeted for attacks, and thus should be hardened.
Behavior blocking
Allowing the suspicious code to execute within the operating system and watches its interactions with the operating system, looking for suspicious activities.
Birthday attack
Cryptographic attack that exploits the mathematics behind the birthday problem in the probability theory forces collisions within hashing functions.
Block cipher
Symmetric algorithm type that encrypts chunks (blocks) of data at a time.
Blowfish
Block symmetric cipher that uses 64-bit block sizes and variable-length keys.
Border Gateway Protocol (BGP)
The protocol that carries out core routing decisions on the Internet. It maintains a table of IP networks, or “prefixes,” which designate network reachability among autonomous systems.
Bots
Software applications that run automated tasks over the Internet, which perform tasks that are both simple and structurally repetitive. Malicious use of bots is the coordination and operation of an automated attack by a botnet (centrally controlled collection of bots).
Broadband transmission
Divides the bandwidth of a communication channel into many channels, enabling different types of data to be transmitted at one time.
Buffer overflow
Too much data is put into the buffers that make up a stack. Common attack vector used by attackers to run malicious code on a target system.
Bus topology
Systems are connected to a single transmission channel (i.e., network cable), forming a linear construct.
Business Continuity Management (BCM)
is the overarching approach to managing all aspects of BCP and DRP.
Business Continuity Plan (BCP)
A business continuity action plan is a document or set of documents that contains the critical information a business needs to stay running in spite of adverse events. A business continuity plan is also called an emergency plan.
Business Impact Analysis (BIA)
An exercise that determines the impact of losing the support of any resource to an organization, establishes the escalation of that loss over time, identifies the minimum resources needed to recover, and prioritizes the recovery of processes and supporting systems.
Cable Modem
A device that provides bidirectional data communication via radio frequency channels on cable TV infrastructures. Cable modems are primarily used to deliver broadband Internet access to homes.
Cache memory
Fast memory type that is used by a CPU to increase read and write operations.
Caesar Cipher
Simple substitution algorithm created by Julius Caesar that shifts alphabetic values three positions during its encryption and decryption processes
Capability Maturity Model Integration (CMMI)
A process improvement methodology that provides guidance for quality improvement and point of reference for appraising existing processes developed by Carnegie Mellon.
Capability Table
A capability table specifies the access rights a certain subject possesses pertaining to specific objects. A capability table is different from an ACL because the subject is bound to the capability table, whereas the object is bound to the ACL.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
LANs using carrier sense multiple access with collision avoidance require devices to announce their intention to transmit by broadcasting a jamming signal.
CBC-MAC
Cipher block chaining message authentication code uses encryption for data integrity and data origin authentication.
Cell
An intersection of a row and a column.
Cell suppression
A technique used to hide specific cells that contain sensitive information.
Central Processing Unit (CPU)
The part of a computer that performs the logic, computation, and decision-making functions. It interprets and executes instructions as it receives them.
Certificate
Digital identity used within a PKI. Generated and maintained by a certificate authority and used for authentication.
Certificate Revocation List (CRL)
List that is maintained by the certificate authority of a PKI that contains information on all of the digital certificates that have been revoked.
Certification
Technical evaluation of the security components and their compliance to a predefined security policy for the purpose of accreditation.
Certification Authority
Component of a PKI that creates and maintains digital certificates throughout their life cycles.
Change control
The process of controlling the changes that take place during the life cycle of a system and documenting the necessary change control activities.
Channel Service Unit (CSU)
A line bridging device for use with T-carriers, and that is required by PSTN providers at digital interfaces that terminate in a Data Service Unit (DSU) on the customer side. The DSU is a piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment.
Chosen-ciphertext attack
Cryptanalysis attack where the attacker chooses a ciphertext and obtains its decryption under an unknown key.
Chosen-plaintext attack
Cryptanalysis attack where the attacker can choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts.
Cipher
Another name for algorithm.
Ciphertext-only attack
Cryptanalysis attack where the attacker is assumed to have access only to a set of ciphertexts.
Classless Interdomain Routing (CIDR)
A method for using the existing 32-bit Internet Address Space efficiently.
Client-side validation
Input validation is done at the client before it is even sent back to the server to process.
Clipping Level
A threshold.
Closed system
Designs are built upon proprietary procedures, which inhibit interoperability capabilities.
Cloud computing
The delivery of computer processing capabilities as a service rather than as a product, whereby shared resources, software, and information are provided to end users as a utility. Offerings are usually bundled as an infrastructure, platform, or software.
CMAC
Cipher message authentication code that is based upon and provides more security compared to CBC-MAC.
CCM
Block cipher mode that combines the CTR encryption mode and CBC-MAC. One encryption key is used for both authentication and encryption purposes.
CobiT
Set of control objectives used as a framework for IT governance developed by Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI).
Cognitive passwords
Fact or opinion based information used to verify an individual’s identity.
Cohesion
A measurement that indicates how many different types of tasks a module needs to carry out.
Collision
(1) A condition that is present when two or more terminals are in contention during simultaneous network access attempts. (2) In cryptography, an instance when a hash function generates the same output for different inputs.
Collusion
Two or more people working together to carry out fraudulent activities.
Common Criteria
International standard used to assess the effectiveness of the security controls built into a system from functional and assurance perspectives.
Compilers
Tools that convert high-level language statements into the necessary machine-level format (.exe, .dll, etc.) for specific processors to understand.
Compression viruses
Another type of virus that appends itself to executables on the system and compresses them by using the user’s permissions.
Concealment Cipher
Encryption method that hides a secret message within an open message.
Confidentiality
A security concept that assures the necessary level of secrecy is enforced and unauthorized disclosure is prevented.
Confusion
Substitution processes used in encryption functions to increase randomness.
Content-based access
Bases access decisions on the sensitivity of the data, not solely on subject identity.
Context-based access
Bases access decisions on the state of the situation, not solely on identity or content sensitivity.
Control
Safeguard that is put in place to reduce a risk, also called a countermeasure.
Control functions (Functions of controls)
Deterrent: Discourage a potential attacker
Preventive: Stop an incident from occurring
Corrective: Fix items after an incident has occurred
Recovery: Restore necessary components to return to normal operations
Detective: Identify an incident’s activities after it took place
Compensating: Alternative control that provides similar protection as the original control
Control types
Administrative, technical (logical), and physical
Control unit
Part of the CPU that oversees the collection of instructions and data from memory and how they are passed to the processing components of the CPU.
Cookies
Data files used by web browsers and servers to keep browser state information and browsing preferences.
Cooperative multitasking
Multitasking scheduling scheme used by older operating systems to allow for computer resource time slicing.
Copyright
A form of protection granted by law for original works of authorship fixed in a tangible medium of expression.
COSO
Internal control model used for corporate governance to help prevent fraud developed by the Committee of Sponsoring Organizations (COSO) of the Treadway Commission.
Cost/benefit analysis
An estimate of the equivalent monetary value of proposed benefits and the estimated costs associated with a control in order to establish whether the control is feasible.
Coupling
A measurement that indicates how much interaction one module requires for carrying out its tasks.
CRAMM
Central Computing and Telecommunications Agency Risk Analysis and Management Method.
Cross-Site Scripting (XSS) attack
An attack where a vulnerability is found on a web site that allows an attacker to inject malicious code into a web application.
Crosstalk
A signal on one channel of a transmission creates an undesired effect in another channel by interacting with it. The signal from one cable “spills over” into another cable.
Cryptanalysis
Practice of uncovering flaws within cryptosystems.
Cryptography
Science of secret writing that enables an entity to store and transmit data in a form that is available only to the intended individuals.
Cryptology
The study of both cryptography and cryptanalysis.
Cryptosystem
Hardware or software implementation of cryptography that contains all the necessary software, protocols, algorithms, and keys.
Data bus
Physical connections between processing components and memory segments used to transmit data being used during processing procedures.
Data custodian
Individual responsible for implementing and maintaining security controls to meet security requirements outlined by data owner.
Data dictionary
Central repository of data elements and their relationships.
Data diddling
The act of willfully modifying information, programs, or documentation in an effort to commit fraud or disrupt production.
Data Execution Prevention (DEP)
Memory protection mechanism used by some operating systems. Memory segments may be marked as non-executable so that they cannot be misused by malicious software.
Data hiding
Use of segregation in design decisions to protect software components from negatively interacting with each other. Commonly enforced through strict interfaces.
Data mining
A methodology used by organizations to better understand their customers, products, markets, or any other phase of the business.
Data modeling
Considers data independently of the way the data are processed and of the components that process the data. A process used to define and analyze data requirements needed to support the business processes.
Data owner
Individual responsible for the protection and classification of a specific data set.
Data structure
A representation of the logical relationship between elements of data.
Data warehousing
Combines data from multiple databases or data sources into a large database for the purpose of providing more extensive information retrieval and data analysis.
Database
A cross-referenced collection of data.
Database Management System (DBMS)
Manages and controls the database.
Decipher
Act of transforming data into a readable format.
Defense-in-depth
Implementation of multiple controls so that successful penetration and compromise is more difficult to attain.
Delphi method
Data collection method that happens in an anonymous fashion.
Differential cryptanalysis
Cryptanalysis method that uses the study of how differences in an input can affect the resultant difference at the output.
Diffie-Hellman algorithm
First asymmetric algorithm created and is used to exchange symmetric key values. Based upon logarithms in finite fields.
Diffusion
Transposition processes used in encryption functions to increase randomness.
Digital Rights Management (DRM)
Access control technologies commonly used to protect copyright material.
Digital signals
Binary digits are represented and transmitted as discrete electrical pulses.
Digital signature
Ensuring the authenticity and integrity of a message through the use of hashing algorithms and asymmetric algorithms. The message digest is encrypted with the sender’s private key.
Digital Subscriber Line (DSL)
A set of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network. DSL is used to digitize the “last mile” and provide fast Internet connectivity.
Distance-Vector routing protocol
A routing protocol that calculates paths based on the distance (or number of hops) and a vector (a direction).
DNS zone transfer
The process of replicating the databases containing the DNS data across a set of DNS servers.
DNSSEC
A set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.
DoDAF
U.S. Department of Defense architecture framework that ensures interoperability of systems to meet military mission goals.
Domain Name System (DNS)
A hierarchical distributed naming system for computers, services, or any resource connected to an IP based network. It associates various pieces of information with domain names assigned to each of the participating entities.
Dual-homed firewall
This device has two interfaces and sits between an untrusted network and trusted network to provide secure access.
Dumpster diving
Refers to going through someone’s trash to find confidential or useful information. It is legal, unless it involves trespassing, but in all cases it is considered unethical.
Dynamic Host Configuration Protocol (DHCP)
DHCP is an industry standard protocol used to dynamically assign IP addresses to network devices.
Dynamic link libraries (DLLs)
A set of subroutines that are shared by different applications and operating system processes.
El Gamal algorithm
Asymmetric algorithm based upon the Diffie-Hellman algorithm used for digital signatures, encryption, and key exchange.
Elliptic curve cryptosystem algorithm
Asymmetric algorithm based upon the algebraic structure of elliptic curves over finite fields. Used for digital signatures, encryption, and key exchange.
E-mail spoofing
Activity in which the sender address and other arts of the e-mail header are altered to appear as though the e-mail originated from a different source. Since SMTP does not provide any authentication, it is easy to impersonate and forge e-mails.
Encapsulating Security Payload Protocol (ESP)
Protocol within the IPSec suite used for integrity, authentication, and encryption.
Encipher
Act of transforming data into an unreadable format.
End-to-End encryption
The encryption of information at the point of origin within the communications network and postponing of decryption to the final destination point.
Ethernet
Common LAN media access technology standardized by IEEE 802.3. Uses 48-bit MAC addressing, works in contention-based networks, and has extended outside of just LAN environments.
Exposure
Presence of a vulnerability, which exposes the organization to a threat.
Facilitated Risk Analysis Process (FRAP)
A focused, qualitative approach that carries out pre-screening to save time and money.
Failure Modes and Effect Analysis (FMEA)
Approach that dissects a component into its basic functions to identify flaws and those flaw’s effects.
Fault tree analysis
Approach to map specific flaws to root causes in complex systems.
Federated identity
A portable identity, and its associated entitlements, that can be used across business boundaries.
Fiber Distributed Data Interface (FDDI)
Ring-based token network protocol that was derived from the IEEE 802.4 token bus timed token protocol. It can work in LAN or MAN environments and provides fault tolerance through dual-ring architecture.
File
A basic unit of data records organized on a storage medium for convenient location, access, and updating.
Foreign key
An attribute of one table that is related to the primary key of another table.
Fraggle attack
A DDoS attack type on a computer that floods the target system with a large amount of UDP echo traffic to IP broadcast addresses.
Frequency analysis
Cryptanalysis process used to identify weaknesses within cryptosystems by locating patterns in resulting ciphertext.
Frequency-Division Multiplexing (FDM)
An older technique in which the available transmission bandwidth of a circuit is divided by frequency into narrow bands, each used for a separate voice or data transmission channel, which many conversations can be carried on one circuit.
Functionality versus Effectiveness of Control
Functionality is what a control does, and its effectiveness is how well the control does it.
Fuzzing
A technique used to discover flaws and vulnerabilities in software.
Garbage collector
Tool that marks unused memory segments as usable to ensure that an operating system does not run out of memory.
General registers
Temporary memory location the CPU uses during its processes of executing instructions. The ALU’s “scratch pad” it uses while carrying out logic and math functions.
Guideline
Suggestions and best practices.
H.323
A standard that addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multipoint conferences.
Hardware segmentation
Physically mapping software to individual memory segments.
Hashed Message Authentication Code (HMAC)
Cryptographic hash function that uses a symmetric key value and is used for data integrity and data origin authentication.
Hierarchical data model
Combines records and fields that are related in a logical tree structure.
High Availability
Refers to a system, component, or environment that is continuously operational.
High-Level languages
Otherwise known as third-generation programming languages, due to their refined programming structures, using abstract statements.
Honeypots
Systems that entice with the goal of protecting critical production systems. If two or more honeypots are used together, this is considered a honeynet.
HTTPS
A combination of HTTP and SSL\TLS that is commonly used for secure Internet connections and e-commerce transactions.