Day 4 Flashcards
An empirical scheme for rating vulnerability severity based upon specific aspects of the vulnerability, environment, and nature of threats.
CVSS
Common Vulnerability Scoring System
In this mode of control and acquisition, an employee chooses a device from a company provided list. Ownership may be personal or organization.
CYOD
Choose Your Own Device
The creator has all control over an asset and access to it. The default form of access for Windows.
DAC
Discretionary Access Control
Exemplified by data center personnel who manage and maintain systems.
Data custodian
Facilitates use
Determines logical controls, authorizes use and defines required security.
Data owner
Responsible for use
This role is filled by personnel capable of managing automated and large information repositories.
DBA
Database Administrator
This attack methodology involves a multitude of remotely controlled devices focusing upon a single target.
DDoS
Distributed Denial of Service
And operating system memory management technique that prevents user data from overlapping into computer instructions.
DEP
Data Execution Prevention
A commonly used method of encoding the data that makes up the certificate using ASN.1.
DER
Distinguished Encoding Rules
The first US government standard for symmetric encryption. It has a 56 bit key.
DES
Digital Encryption Standard
This is an extension of BOOTP and is used to dynamically allocate IPs.
DHCP
Dynamic Host Configuration Protocol
This is a key exchange algorithm that enhances confidentiality by discarding the session keys after use.
DHE
Diffie-Hellman Ephemeral
Performs hashing or encryption on an array of predetermined candidate phrases, and compares it to the secret.
Dictionary
Dictionary attack
It moves files to alternative media that have the archive bit set, and then it does not clear it.
Differential BU
Differential backup
A messaging security standard designed to facilitate non-repudiation between sender and receiver.
DKIM
Domain Keys Identified Mail
These files are not directly executed, but are called up by an application when certain additional functions or libraries are needed.
DLL
Dynamic Link Library
Strategies and applications that prevent data theft or illicit access.
DLP
Data Loss Prevention
This is an email security standard designed to allow domains to protect themselves from unauthorized use and spoofing.
DMARC
Domain Message
Authentication Reporting
and Conformance
The initial destination of a packet as it enters a NAT system to be redirected to another destination.
DNAT
Destination Network Address Translation
The perimeter area where the outside world may access certain services.
DMZ
Demilitarized Zone
An application that handles symbolic name to address mappings, as well as the reverse.
DNS
Domain Name Service
An array of tools devised by the IETF to secure DNS transactions.
DNSSEC
Domain Name System Security Extensions
A one on one attack that causes access or utility to cease.
DoS
Denial of Service
A senior officer responsible for an organization’s data protection strategies and compliance.
DPO
Data Protection Officer
The immediate plans for recovery of operations or services in the event of a catastrophic incident.
DRP
Disaster Recovery Plan