CISSP Terms Flashcards

1
Q

Access

A

A subject’s ability to view, modify, or communicate with an object. Access enables the flow of information between the subject and the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control

A

Mechanisms, controls, and methods of limiting access to resources to authorized subjects only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control List (ACL)

A

A list of subjects that are authorized to access a particular object. Typically, the types of access are read, write, execute, append, modify, delete, and create.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control Mechanism

A

Administrative, physical, or technical control that is designed to detect and prevent unauthorized access to a resource or environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accountability

A

A security principle indicating that individuals must be identifiable and must be held responsible for their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accredited

A

A computer system or network that has received official authorization and approval to process sensitive data in a specific operational environment. There must be a security evaluation of the system?s hardware, software, configurations, and controls by technical personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Add?On Security

A

Security protection mechanisms that are hardware or software retrofitted to a system to increase that system?s protection level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Administrative Controls

A

Security mechanisms that are management?s responsibility
and referred to as ?soft? controls. These controls include the development and publication of policies, standards, procedures, and guidelines, the screening of personnel, security awareness training, the monitoring of system activity, and change control procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Annualized Loss Expectancy (ALE)

A

A dollar amount that estimates the loss potential from a risk in a span of a year.

single loss expectancy (SLE) ? annualized rate of occurrence (ARO) = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Annualized Rate of Occurrence (ARO)

A

The value that represents the estimated possibility of a specific threat taking place within a one?year timeframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assurance

A

A measurement of confidence in the level of protection that a specific security control delivers and the degree to which it enforces the security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attack

A

An attempt to bypass security controls in a system with the mission of using that system or compromising it. An attack is usually accomplished by exploiting a current vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Audit Trail

A

A chronological set of logs and records used to provide evidence of a system?s performance or activity that took place on the system. These logs and records
can be used to attempt to reconstruct past events and track the activities that took place and possibly detect and identify intruders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Autehnticate

A

To verify the identity of a subject requesting the use of a system and/or access to network resources. The steps to giving a subject access to an object should be identification, authentication, and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorization

A

Granting access to an object after the subject has been properly identified and authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Automated Information System (AIS)

A

A computer system that is used to process and transmit data. It is a collection of hardware, software, and firmware that works together to accept, compute, communicate, store, process, transmit, and control dataprocessing functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Availability

A

The reliability and accessibility of data and resources to authorized individuals in a timely manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Back Up

A

Copy and move data to a medium so that it may be restored if the original data is corrupted or destroyed. A full backup copies all the data from the system to the backup medium. An incremental backup copies only the files that have been modified since the previous backup. A differential backup backs up all files since the last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Backdoor

A

An undocumented way of gaining access to a computer system. After a system is compromised, an attacker may load a program that listens on a port (backdoor) so that the attacker can enter the system at any time. A backdoor is also referred to as a trapdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Baseline

A

The minimum level of security necessary to support and enforce a security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bell?LaPadula Model

A

The model uses a formal state transition model that describes its access controls and how they should perform. When the system must transition from one state to another, the security of the system should never be lowered or compromised. See also multilevel security, simple security property, and star property (*?property).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Biba Model

A

A formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Biometrics

A

When used within computer security, used to identify individuals by physiological characteristics, such as a fingerprint, hand geometry, or pattern in the iris.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Browsing

A

Searching through storage media looking for specific information without necessarily knowing what format the information is in. A browsing attack is one in which the attacker looks around a computer system either to see what looks interesting or to find specific information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Brute Force Attack

A

An attack that continually tries different inputs to achieve a predefined goal, which can be used to obtain credentials for unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Callback

A

A procedure for identifying a system that accessed an environment remotely. In a callback, the host system disconnects the caller and then dials the authorized telephone number of the remote terminal in order to reestablish the connection. Synonymous with dialback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Capability

A

A capability outlines the objects a subject can access and the operations the subject can carry out on the different objects. It indicates the access rights for a specific subject; many times, the capability is in the form of a ticket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Certification

A

The technical evaluation of the security components and their compliance for the purpose of accreditation. A certification process can use safeguard evaluation, risk analysis, verification, testing, and auditing techniques to assess the appropriateness of a specific system processing a certain level of information within a particular environment. The certification is the testing of the security component or system, and the accreditation is the approval from management of the security component or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Challenge?Response Method

A

A method used to verify the identity of a subject by sending the subject an unpredictable or random value. If the subject responds with the expected value in return, the subject is authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CIA Triad

A

The three security principles: availability, integrity, and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Ciphertext

A

Data that has been encrypted and is unreadable until it has been converted into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Clark?Wilson Model

A

An integrity model that addresses all three integrity goals: prevent unauthorized users from making modifications, prevent authorized users from making improper modifications, and maintain internal and external consistency through auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Classification

A

A systematic arrangement of objects into groups or categories according to a set of established criteria. Data and resources can be assigned a level of sensitivity as they are being created, amended, enhanced, stored, or transmitted. The classification level then determines the extent to which the resource needs to be controlled and secured, and is indicative of its value in terms of information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Cleartext

A

In data communications, cleartext is the form of a message or data which is transferred or stored without cryptographic protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Collusion

A

Two or more people working together to carry out a fraudulent activity. More than one person would need to work together to cause some type of destruction or fraud; this drastically reduces its probability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Communications Security

A

Controls in place to protect information as it is being transmitted, especially by telecommunications mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Compartment

A

A class of information that has need?to?know access controls beyond those normally provided for access to confidential, secret, or top?secret information. A compartment is the same thing as a category within a security label. Just because a subject has the proper classification, that does not mean it has a need to know. The category, or compartment, of the security label enforces the subject?s need to know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Compartmented Mode Workstation (CMW)

A

A workstation that contains the necessary controls to be able to operate as a trusted computer. The system is trusted to keep data from different classification levels and categories in separate compartments and properly protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Compensating Controls

A

Controls that are alternative procedures designed to reduce the risk. They are used to ?counterbalance? the effects of an internal control weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Compromise

A

A violation of the security policy of a system or an organization such that unauthorized disclosure or modification of sensitive information occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Computer Fraud

A

Computer?related crimes involving deliberate misrepresentation, modification, or disclosure of data in order to compromise a system or obtain something of value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Confidentiality

A

A security principle that works to ensure that information is not disclosed to unauthorized subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Configuration Management

A

The identification, control, accounting, and documentation of all changes that take place to system hardware, software, firmware, supporting documentation, and test results throughout the lifespan of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Confinement

A

Controlling information in a manner that prevents sensitive data from being leaked from a program to another program, subject, or object in an unauthorized manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Contingency Plan

A

A plan put in place before any potential emergencies, with the mission of dealing with possible future emergencies. It pertains to training personnel, performing backups, preparing critical facilities, and recovering from an emergency or disaster so that business operations can continue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Control Zone

A

The space within a facility that is used to protect sensitive processing equipment. Controls are in place to protect equipment from physical or technical unauthorized entry or compromise. The zone can also be used to prevent electrical waves carrying sensitive data from leaving the area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Cost/Benefit Analysis

A

An assessment that is performed to ensure that the cost of a safeguard does not outweigh the benefit of the safeguard. Spending more to protect an asset than the asset is actually worth does not make good business sense. All possible safeguards must be evaluated to ensure that the most security?effective and cost?effective choice is made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Countermeasure

A

A control, method, technique, or procedure that is put into place to prevent a threat agent from exploiting a vulnerability. A countermeasure is put into place to mitigate risk. Also called a safeguard or control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Covert Channel

A

A communications path that enables a process to transmit information in a way that violates the system?s security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Covert Storage Channel

A

A covert channel that involves writing to a storage location by one process and the direct or indirect reading of the storage location by another process. Covert storage channels typically involve a resource (for example, sectors on a disk) that is shared by two subjects at different security levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Covert Timing Channel

A

A covert channel in which one process modulates its system resource (for example, CPU cycles), which is interpreted by a second process as some type of communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Cryptanalysis

A

The practice of breaking cryptosystems and algorithms used in encryption and decryption processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Cryptography

A

The science of secret writing that enables storage and transmission of data in a form that is available only to the intended individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Cryptology

A

The study of cryptography and cryptanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Cryptosystem

A

The hardware or software implementation of cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Data Classification

A

Assignments to data that indicate the level of availability, integrity, and confidentiality that is required for each type of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Data Custodian

A

An individual who is responsible for the maintenance and protection of the data. This role is usually filled by the IT department (usually the network administrator). The duties include performing regular backups of the data, implementing security mechanisms, periodically validating the integrity of the data, restoring data from backup media, and fulfilling the requirements specified in the company?s security policy, standards, and guidelines that pertain to information security and data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Data Encryption Standard (DES)

A

Symmetric key encryption algorithm that was adopted by the government as a federal standard for protecting sensitive unclassified information. DES was later replaced with Advanced Encryption Standard (AES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Data Remanence

A

A measure of the magnetic flux density remaining after removal of the applied magnetic force, which is used to erase data. Refers to any data remaining on magnetic storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Database Shadowing

A

A mirroring technology used in databases, in which information is written to at least two hard drives for the purpose of redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Declassification

A

An administrative decision or procedure to remove or reduce the security classification information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Dedicated Security Mode

A

The mode in which a system operates if all users have the clearance or authorization to access, and the need to know about, all data processed within the system. All users have been given formal access approval for all information on the system and have signed nondisclosure agreements pertaining to this information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Degauss

A

Process that demagnetizes magnetic media so that a very low residue of magnetic induction is left on the media. Used to effectively erase data from media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Delphi Technique

A

A group decision method used to ensure that each member of a group gives an honest and anonymous opinion pertaining to the company?s risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Denial of Service (DoS)

A

Any action, or series of actions, that prevents a system, or its resources, from functioning in accordance with its intended purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Dial?Up

A

The service whereby a computer terminal can use telephone lines, usually via a modem, to initiate and continue communication with another computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Dictionary Attack

A

Is used when the password to be cracked is believed to be based on a word that be found is a list of common words. .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Digital Signature

A

An electronic signature based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters such that the identity of the signer and the integrity of the data can be verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Disaster Recovery Plan

A

A plan developed to help a company recover from a disaster. It provides procedures for emergency response, extended backup operations, and post?disaster recovery when an organization suffers a loss of computer processing capability or resources and physical facilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Discretionary Access Control (DAC)

A

An access control model and policy that restricts access to objects based on the identity of the subjects and the groups to which those subjects belong. The data owner has the discretion of allowing or denying others access to the resources it owns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Domain

A

The set of objects that a subject is allowed to access. Within this domain, all subjects and objects share a common security policy, procedures, and rules, and they are managed by the same management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Due Care

A

Steps taken to show that a company has taken responsibility for the activities that occur within the corporation and has taken the necessary steps to help protect the company, its resources, and employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Due Diligence

A

The process of systematically evaluating information to identify vulnerabilities, threats, and issues relating to an organization?s overall risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Electronic Vaulting

A

The transfer of backup data to an offsite location. This process is primarily a batch process of transmitting data through communications lines to a server at an alternate location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Emanations

A

(Also called Tempest) Electrical and electromagnetic signals emitted from electrical equipment that can transmit through the airwaves. These signals carry information that can be captured and deciphered, which can cause a security breach. These are also called emissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Encryption

A

The transformation of plaintext into unreadable ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

End to End Encryption

A

A technology that encrypts the data payload of a packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Evaluated Products List (EPL)

A

A list of products that have been evaluated and assigned an assurance rating. The products could be evaluated using several different criterion: TCSEC, ITSEC, or Common Criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Exposure

A

An instance of being exposed to losses from a threat. A weakness or vulnerability can cause an organization to be exposed to possible damages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Exposure Factor

A

The percentage of loss a realized threat could have on a certain asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Failover

A

A backup operation that automatically switches to a standby system if the primary system fails or is taken offline. It is an important fault?tolerant function that provides system availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Fail?Safe

A

A functionality that ensures that when software or a system fails for any reason, it does not end up in a vulnerable state. After a failure, software might default to no access instead of allowing full control, which would be an example of a fail?safe measure.

83
Q

Firmware

A

Software instructions that have been written into read?only memory (ROM) or a programmable ROM (PROM) chip.

84
Q

Formal Security Policy Model

A

A mathematical statement of a security policy. When an operating system is created, it can be built upon a predeveloped model that lays out how all activities will take place in each and every situation. This model can be expressed mathematically, which is then translated into a programming language.

85
Q

Formal Verification

A

Validating and testing of highly trusted systems. The tests are designed to show design verification, consistency between the formal specifications and the formal security policy model, implementation verification, consistency between the formal specifications, and the actual implementation of the product.

86
Q

Gateway

A

A system or device that connects two unlike environments or systems. The gateway is usually required to translate between different types of applications or protocols.

87
Q

Guidelines

A

Recommended actions and operational guides for users, IT staff, operations staff, and others when a specific standard does not apply.

88
Q

Handshaking Procedure

A

A dialog between two entities for the purpose of identifying and authenticating the entities to one another. The dialog can take place between two computers or two applications residing on different computers. It is an activity that usually takes place within a protocol.

89
Q

Honeypot

A

A computer set up as a sacrificial lamb on the network in the hope that attackers will attack this system instead of actual production systems.

90
Q

Identification

A

A subject provides some type of data to an authentication service. Identification is the first step in the authentication process.

91
Q

Information Owner

A

The person who has final corporate responsibility of data protection and would be the one held liable for any negligence when it comes to protecting the company?s information assets. The person who holds this role?usually a senior executive within the management group of the company?is responsible for assigning a classification to the information and dictating how the information should be protected.

92
Q

Integrity

A

A security principle that makes sure that information and systems are not modified maliciously or accidentally.

93
Q

Intrusion Detection System (IDS)

A

Software employed to monitor and detect possible attacks and behaviors that vary from the normal and expected activity. The IDS can be network based, which monitors network traffic, or host based, which monitors activities of a specific system and protects system files and control mechanisms.

94
Q

Isolation

A

The containment of processes in a system in such a way that they are separated from one another to ensure integrity and confidentiality.

95
Q

Kernel

A

The core of an operating system, a kernel manages the machine?s hardware resources (including the processor and the memory), and provides and controls the way any other software component accesses these resources.

96
Q

Key

A

A discreet data set that controls the operation of a cryptography algorithm. In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption. Keys are also used in other cryptographic algorithms, such as digital signature schemes and keyed?hash functions (also known as HMACs), which are often used for authentication and integrity.

97
Q

Keystroke Monitoring

A

A type of auditing that can review or record keystrokes entered by a user during an active session.

98
Q

Lattice?Based Access Control Model

A

A mathematical model that allows a system to easily represent the different security levels and control access attempts based on those levels. Every pair of elements has a highest lower bound and a lowest upper bound of access rights. The classes stemmed from military designations.

99
Q

Least Privilege

A

The security principle that requires each subject to be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error, or unauthorized use.

100
Q

Life?Cycle Assurance

A

Confidence that a trusted system is designed, developed, and maintained with formal designs and controls. This includes design specification and verification, implementation, testing, configuration management, and distribution.

101
Q

Link Encryption

A

A type of encryption technology that encrypts packets? headers, trailers, and the data payload. Each network communications node, or hop, must decrypt the packets to read its address and routing information and then re?encrypt the packets. This is different from end?to?end encryption.

102
Q

Logic Bomb

A

A malicious program that is triggered by a specific event or condition.

103
Q

Loss Potential

A

The potential losses that can be accrued if a threat agent actually exploits a vulnerability.

104
Q

Detective Controls

A

Blocks unwanted actions before they happen

105
Q

Preventive Controls

A

Identifies, logs and alerts management to unwanted actions or events as or after they occur.

106
Q

Corrective Controls

A

Remedy the circumstances to enable the unwanted activity and/or return conditions to where they were prior to the unwanted activity.

107
Q

Directive

A

Those controls dictated by organizational and legal authorities

108
Q

Deterrent

A

Prescribe some sort of punishment - Intent is to dissuade people from performing unwanted acts.

109
Q

Recovery

A

Restore lost computing resources or capabilities.

110
Q

Compensating

A

Reinforce or replace normal controls that are unavailable for any reason.

111
Q

Administrative Control

A

Documented or personnel oriented actions that are established to provide an acceptable level of protection for computing resources.

112
Q

Technical/Logical Controls

A

Involve the use of hardware or software mechanisms to protect computing resources or unauthorized access.

113
Q

Physical Control

A

Manual, structural or environmental controls that protect facilities and computing resources from unauthorized access or natural threats.

114
Q

Maintenance Hook

A

Instructions within a program’s code that enable the developer or maintainer to enter the program without having to go through the usual access control and authentication processes. Maintenance hooks should be removed from the code before it is released to production; otherwise, they can cause serious security risks.
Also called trapdoor or backdoor.

115
Q

Malware

A

Malicious software. Code written to perform activities that circumvent the security policy of a system. Examples are viruses, malicious applets, Trojan horses, logical bombs, and worms.

116
Q

Mandatory Access Control (MAC)

A

An access policy that restricts subjects’ access to objects based on the security clearance of the subject and the classification of the object. The system enforces the security policy, and users cannot share their files with
other users.

117
Q

Masquerading

A

Impersonating another user, usually with the intention of gaining unauthorized access to a system.

118
Q

Message Authentication Code (MAC)

A

In cryptography, a message authentication code (MAC) is a generated value used to authenticate a message. A MAC can be generated by HMAC or CBC-MAC methods. The MAC protects both a message’s integrity (by ensuring that a different MAC will be produced if the message has changed) as well as its authenticity, because only someone who knows the secret key could have
modified the message.

119
Q

Multilevel Security

A

A class of systems containing information with different classifications. Access decisions are based on the subject’s security clearances, need to know, and formal approval.

120
Q

Need to Know

A

A security principle stating that users should have access only to the information and resources necessary to complete their tasks that fulfill their roles within an organization. Need to know is commonly used in access control criteria by operating systems and applications.

121
Q

Node

A

A system that is connected to a network.

122
Q

Object

A

A passive entity that contains or receives information. Access to an object potentially implies access to the information that it contains. Examples of objects include
records, pages, memory segments, files, directories, directory trees, and programs.

123
Q

Object Reuse

A

Reassigning to a subject media that previously contained information. Object reuse is a security concern because if insufficient measures were taken to erase the information on the media, the information may be disclosed to unauthorized personnel.

124
Q

One-time Pad

A

A method of encryption in which the plaintext is combined with a random “pad,” which should be the same length as the plaintext. This encryption process
uses a nonrepeating set of random bits that are combined bitwise (XOR) with the message to produce ciphertext. A one-time pad is a perfect encryption scheme, because it is unbreakable and each pad is used exactly once, but it is impractical because of all of the required overhead.

125
Q

Operational Assurance

A

A level of confidence of a trusted system’s architecture
and implementation that enforces the system’s security policy. This can include system architecture, covert channel analysis, system integrity, and trusted recovery.

126
Q

Operational Goals

A

Daily goals to be accomplished to ensure the proper operation of an environment.

127
Q

Operator

A

An individual who supports the operations of computer systems—usually a mainframe. The individual may monitor the execution of the system, control the
flow of jobs, and develop and schedule batch jobs.

128
Q

Orange Book

A

The common name for the Trusted Computer Security Evaluation Criteria (TCSEC).

129
Q

Overt Channel

A

A path within a computer system or network that is designed for the authorized transfer of data.

130
Q

Password

A

A sequence of characters used to prove one’s identity. It is used during a logon process and should be highly protected.

131
Q

Penetration

A

A successful attempt at circumventing security controls and gaining access to a system.

132
Q

Penetration Testing

A

Penetration testing is a method of evaluating the security of a computer system or network by simulating an attack that a malicious hacker would carry out. This is done so that vulnerabilities and weaknesses can be uncovered.

133
Q

Permissions

A

The type of authorized interactions that a subject can have with an object. Examples include read, write, execute, add, modify, and delete.

134
Q

Personnel Security

A

The procedures that are established to ensure that all personnel who have access to sensitive information have the required authority as well as appropriate
clearances. Procedures confirm a person’s background and provide assurance of necessary trustworthiness.

135
Q

Physical Controls

A

Controls that pertain to controlling individual access into the facility and different departments, locking systems and removing unnecessary floppy or CD-ROM drives, protecting the perimeter of the facility, monitoring for intrusion, and checking environmental controls.

136
Q

Physical Security

A

Controls and procedures put into place to prevent intruders from physically accessing a system or facility. The controls enforce access control and authorized access.

137
Q

Piggyback

A

Unauthorized access to a system by using another user’s legitimate credentials.

138
Q

Plaintext

A

In cryptography, the original readable text before it is encrypted.

139
Q

Playback Attack

A

Capturing data and resending the data at a later time in the hope of tricking the receiving system. This is usually carried out to obtain unauthorized access to specific resources.

140
Q

Privacy

A

A security principle that protects an individual’s information and employs controls to ensure that this information is not disseminated or accessed in an unauthorized
manner.

141
Q

Procedure

A

Detailed step-by-step instructions to achieve a certain task, which are used by users, IT staff, operations staff, security members, and others.

142
Q

Protection Ring

A

An architecture that provides hierarchies of privileged operation modes of a system, which gives certain access rights to processes that are authorized to operate in that mode. Supports the integrity and confidentiality requirements of multitasking operating systems and enables the operating system to protect itself from user
programs and rogue processes.

143
Q

Protocol

A

A set of rules and formats that enables the standardized exchange of information between different systems.

144
Q

Pseudo-Flaw

A

An apparent loophole deliberately implanted in an operating system or program as a trap for intruders.

145
Q

Public Key Encryption

A

A type of encryption that uses two mathematically related
keys to encrypt and decrypt messages. The private key is known only to the owner, and the public key is available to anyone.

146
Q

Purge

A

The removal of sensitive data from a system, storage device, or peripheral device with storage capacity at the end of a processing period. This action is performed in such a way that there is assurance proportional to the sensitivity of the data that the data cannot be reconstructed.

147
Q

Qualitative Risk Analysis

A

A risk analysis method that uses intuition and experience
to judge an organization’s exposure to risks. It uses scenarios and ratings systems. Compare to quantitative risk analysis.

148
Q

Quantitative Risk Analysis

A

A risk analysis method that attempts to use percentages
in damage estimations and assigns real numbers to the costs of countermeasures for particular risks and the amount of damage that could result from the risk. Compare to qualitative risk analysis.

149
Q

RADIUS (Remote Authentication Dial-in User Service)

A

A security service that authenticates and authorizes dial-up users and is a centralized access control
mechanism.

150
Q

Read

A

An operation that results in the flow of information from an object to a subject and does not give the subject the ability to modify the object or the data within the object.

151
Q

Recovery Planning

A

The advance planning and preparations that are necessary to minimize loss and to ensure the availability of the critical information systems of an organization after a disruption in service or a disaster.

152
Q

Reference Monitor Concept

A

An access control concept that refers to an abstract

machine that mediates all accesses to objects by subjects. The security kernel enforces the reference monitor concept.

153
Q

Reliability

A

The assurance of a given system, or individual component, performing its mission adequately for a specified period of time under the expected operating conditions.

154
Q

Remote Journaling

A

A method of transmitting changes to data to an offsite facility. This takes place as parallel processing of transactions, meaning that changes to the data
are saved locally and to an off-site facility. These activities take place in real time and provide redundancy and fault tolerance.

155
Q

Repudiation

A

When the sender of a message denies sending the message. The countermeasure to this is to implement digital signatures.

156
Q

Residual Risk

A

The remaining risk after the security controls have been applied. The conceptual formulas that explain the difference between total and residual risk are
threats × vulnerability × asset value = total risk
(threats × vulnerability × asset value) × controls gap = residual risk

157
Q

Risk

A

The likelihood of a threat agent taking advantage of a vulnerability and the resulting business impact. A risk is the loss potential, or probability, that a threat will exploit a vulnerability.

158
Q

Risk Analysis

A

A method of identifying risks and assessing the possible damage that could be caused in order to justify security safeguards.

159
Q

Risk Management

A

The process of identifying, assessing, and reducing the risk to an acceptable level and implementing the right mechanisms to maintain that level of risk.

160
Q

Role-based Access Control (RBAC)

A

Type of model that provides access to resources

based on the role the user holds within the company or the tasks that the user has been assigned.

161
Q

Safe Guard

A

A software configuration, hardware, or procedure that eliminates a vulnerability or reduces the risk of a threat agent from being able to exploit a vulnerability. Also called a countermeasure or control.

162
Q

Secure Configuration Management

A

Implementing the set of appropriate procedures
to control the life cycle of an application, document the necessary change control activities, and ensure that the changes will not violate the security policy.

163
Q

Security Evaluation

A

Assesses the degree of trust and assurance that can be placed in systems for the secure handling of sensitive information.

164
Q

Security Kernel

A

The hardware, firmware, and software elements of a trusted computing base (TCB) that implement the reference monitor concept. The kernel must mediate all access between subjects and objects, be protected from modification, and be verifiable as correct.

165
Q

Security Label

A

An identifier that represents the security level of an object.

166
Q

Security Perimeter

A

An imaginary boundary between the components within the trusted computing base (TCB) and mechanisms that do not fall within the TCB. It is the distinction between trusted and untrusted processes.

167
Q

Security Policy

A

Documentation that describes senior management’s directives toward the role that security plays within the organization. It provides a framework within which an organization establishes needed levels of information security to achieve the desired confidentiality, availability, and integrity goals. A policy is a statement of information values, protection responsibilities, and organization commitment managing risks.

168
Q

Security Testing

A

Testing all security mechanisms and features within a system to determine the level of protection they provide. Security testing can include penetration testing, formal design and implementation verification, and functional testing.

169
Q

Sensitive Information

A

Information that would cause a negative effect on the

company if it were lost or compromised.

170
Q

Sensitivity Label

A

A piece of information that represents the security level of an object. Sensitivity labels are used by the TCB as the basis for mandatory access control (MAC) decisions.

171
Q

Separation of Duties

A

A security principle that splits up a critical task among two or more individuals to ensure that one person cannot complete a risky task by himself.

172
Q

Shoulder Surfing

A

When a person looks over another person’s shoulder and watches keystrokes or watches data as it appears on the screen in order to uncover information in an unauthorized manner.

173
Q

Simple Security Property

A

A Bell-LaPadula security model rule that stipulates that a subject cannot read data at a higher security level.

174
Q

Single Loss Expectancy (SLE)

A

A dollar amount that is assigned to a single event that
represents the company’s potential loss amount if a specific threat were to take place.
asset value × exposure factor = SLE

175
Q

Social Engineering

A

The act of tricking another person into providing confidential information by posing as an individual who is authorized to receive that information.

176
Q

Spoofing/Masquerading

A

Presenting false information, usually within packets, to trick other systems and hide the origin of the message. This is usually done by hackers so that their identity
cannot be successfully uncovered.

177
Q

Standards

A

Rules indicating how hardware and software should be implemented, used, and maintained. Standards provide a means to ensure that specific technologies, applications, parameters, and procedures are carried out in a uniform way across the organization. They are compulsory.

178
Q

Star Property (*-property)

A

A Bell-LaPadula security model rule that stipulates

that a subject cannot write data to an object at a lower security level.

179
Q

Strategic Goals

A

Long-term goals that are broad, general statements of intent. Operational and tactical goals support strategic goals and all are a part of a planning horizon.

180
Q

Subject

A

An active entity, generally in the form of a person, process, or device, that causes information to flow among objects or that changes the system state.

181
Q

Supervisor State

A

One of several states in which an operating system may operate, and the only one in which privileged instructions may be executed by the CPU.

182
Q

TACACS (Terminal Access Controller Access Control System)

A

A client/server authentication protocol that provides the same type of functionality as RADIUS and is used as a central access control mechanism mainly for remote users.

183
Q

Tactical Goals

A

Midterm goals to accomplish. These may be milestones to accomplish within a project or specific projects to accomplish in a year. Strategic, tactical, and operational goals make up a planning horizon.

184
Q

Technical Controls

A

These controls, also called logical access control mechanisms, work in software to provide confidentiality, integrity, or availability protection. Some examples are passwords, identification and authentication methods, security devices, auditing, and the configuration of the network.

185
Q

Tempest

A

The study and control of spurious electronic signals emitted by electrical equipment. Tempest equipment is implemented to prevent intruders from picking up
information through the airwaves with listening devices.

186
Q

Threat

A

Any potential danger that a vulnerability will be exploited by a threat agent.

187
Q

Top-down Approach

A

An approach in which the initiation, support, and direction for a project come from top management and work their way down through middle management and then to staff members.

188
Q

Topology

A

The physical construction of how nodes are connected to form a network.

189
Q

Total Risk

A

When a safeguard is not implemented, an organization is faced with the total risk of that particular vulnerability.

190
Q

Trojan Horse

A

A computer program that has an apparently or actually useful function, but that also contains additional hidden malicious capabilities to exploit a vulnerability and/or provide unauthorized access into a system.

191
Q

Trusted Computer System

A

A system that has the necessary controls to ensure
that the security policy will not be compromised and that can process a range of sensitive or classified information simultaneously.

192
Q

Trusted Computing Base (TCB)

A

All of the protection mechanisms within a computer system (software, hardware, and firmware) that are responsible for enforcing a security policy.

193
Q

Trusted path

A

A mechanism within the system that enables the user to communicate directly with the TCB. This mechanism can be activated only by the user or the TCB and not by an untrusted mechanism or process.

194
Q

Trusted Recovery

A

A set of procedures that restores a system and its data in a trusted manner after the system has been disrupted or a system failure has occurred.

195
Q

User

A

A person or process that is accessing a computer system.

196
Q

User ID

A

A unique set of characters or code that is used to dentify a specific user to a system.

197
Q

Validation

A

The act of performing tests and evaluations to test a system’s security level to see if it complies with security specifications and requirements.

198
Q

Virus

A

A small application, or string of code, that infects applications. The main function of a virus is to reproduce, and it requires a host application to do this. It can damage data directly or degrade system performance.

199
Q

Vulnerability

A

The absence or weakness of a safeguard that could be exploited.

200
Q

War-dialing

A

An attack in which a long list of phone numbers is inserted into a wardialing program in the hope of finding a modem that can be exploited to gain unauthorized
access.

201
Q

Work factor

A

The estimated time and effort required for an attacker to overcome a security control.

202
Q

Worm

A

An independent program that can reproduce by copying itself from one system to another. It may damage data directly or degrade system performance by tying up
resources.

203
Q

Write

A

An operation that results in the flow of information from a subject to an object.