Day 4 Reversed Flashcards
CVSS
Common Vulnerability Scoring System
An empirical scheme for rating vulnerability severity based upon specific aspects of the vulnerability, environment, and nature of threats.
CYOD
Choose Your Own Device
In this mode of control and acquisition, an employee chooses a device from a company provided list. Ownership may be personal or organization.
DAC
Discretionary Access Control
The creator has all control over an asset and access to it. The default form of access for Windows.
Data Custodian
Facilitates Use
Exemplified by data center personnel who manage and maintain systems.
Data Owner
Responsible For Use
Determines logical controls, authorizes use and defines required security.
DBA
Database Administrator
This role is filled by personnel capable of managing automated and large information repositories.
DDoS
Distributed Denial of Service
This attack methodology involves a multitude of remotely controlled devices focusing upon a single target.
DEP
Data Execution Prevention
And operating system memory management technique that prevents user data from overlapping into computer instructions.
DER
Distinguished Encoding Rules
A commonly used method of encoding the data that makes up the certificate using ASN.1
DES
Digital Encryption Standard
The first US government standard for symmetric encryption. It has a 56 bit key.
DHCP
Dynamic Host Configuration Protocol
This is an extension of BOOTP and is used to dynamically allocate IPs.
DHE
Diffie-Hellman Ephemeral
This is a key exchange algorithm that enhances confidentiality by discarding the session keys after use.
DA
Dictionary Attack
Performs hashing or encryption on an array of predetermined candidate phrases, and compares it to the secret.
Differential BU
Differential Backup
It moves files to alternative media that have the archive bit set, and then it does not clear it.
DKIM
Domain Keys Identified Mail
A messaging security standard designed to facilitate non-repudiation between sender and receiver.