Day 4 Flashcards
An empirical scheme for rating vulnerability severity based upon specific aspects of the vulnerability, environment, and nature of threats.
CVSS
Common Vulnerability Scoring System
In this mode of control and acquisition, an employee chooses a device from a company provided list. Ownership may be personal or organization.
CYOD
Choose Your Own Device
The creator has all control over an asset and access to it. The default form of access for Windows.
DAC
Discretionary Access Control
Exemplified by data center personnel who manage and maintain systems.
Data custodian
Facilitates use
Determines logical controls, authorizes use and defines required security.
Data owner
Responsible for use
This role is filled by personnel capable of managing automated and large information repositories.
DBA
Database Administrator
This attack methodology involves a multitude of remotely controlled devices focusing upon a single target.
DDoS
Distributed Denial of Service
And operating system memory management technique that prevents user data from overlapping into computer instructions.
DEP
Data Execution Prevention
A commonly used method of encoding the data that makes up the certificate using ASN.1.
DER
Distinguished Encoding Rules
The first US government standard for symmetric encryption. It has a 56 bit key.
DES
Digital Encryption Standard
This is an extension of BOOTP and is used to dynamically allocate IPs.
DHCP
Dynamic Host Configuration Protocol
This is a key exchange algorithm that enhances confidentiality by discarding the session keys after use.
DHE
Diffie-Hellman Ephemeral
Performs hashing or encryption on an array of predetermined candidate phrases, and compares it to the secret.
Dictionary
Dictionary attack
It moves files to alternative media that have the archive bit set, and then it does not clear it.
Differential BU
Differential backup
A messaging security standard designed to facilitate non-repudiation between sender and receiver.
DKIM
Domain Keys Identified Mail