Domain 3: Security Architecture and Engineering Flashcards
Learn essential terms related to secure system design, hardware, and cryptographic principles.
Define:
3DES
A symmetric-key encryption method that applies the DES algorithm three times to each data block using three separate keys, enhancing security for sensitive data transmission.
Also known as Triple Data Encryption Standard, it’s a widely used symmetric key encryption algorithm that encrypts data three times using three different keys. It is considered a more secure alternative to the original Data Encryption Standard (DES) algorithm, as it increases the difficulty of breaking the encryption by using multiple keys. 3DES is commonly used in financial transactions, online payments, and other sensitive data transmissions. It is also used in many security protocols, such as SSL and VPNs, to ensure secure communication between devices.
For more information, view this lecture on Symmetric Encryption- Part 1. Or visit this Wikipedia page.
Define:
99.999 Uptime
Describes a system’s reliability, with operational status maintained with only downtime for less than 6 minutes annually, tier 4 data centers would fall into this category.
The high availability of a system or service, quantified as being operational 99.999% of the time, often referred to as “five nines”. This equates to a downtime of approximately 5 minutes and 15 seconds per year, thus indicating a system with highly reliable and uninterrupted service. High availability is crucial for systems where even minimal downtime can lead to significant operational or financial impact.
Or visit this Wikipedia page.
Define:
Abend
An unexpected program or system crash due to errors, often resulting from bugs, leading to an ‘abnormal end’ of operations.
Stands for abnormal end. It refers to an unexpected termination of a program or system due to an error or bug. It is commonly used in the context of computer systems and software development to refer to a crash or failure.
Or visit this Wikipedia page.
Define:
Abstraction
The practice of simplifying complex systems by concealing intricate details and presenting a user-friendly interface to interact with technology.
A fundamental concept in computer science that involves managing complexity by hiding unnecessary details from the user. Abstraction enables users to interact with systems and applications through simplified models without needing to understand the underlying complex workings.
For more information, view this lecture on Secure System Design Concepts. Or visit this Wikipedia page.
Define:
Accreditation
The official recognition that a system, product, or individual meets certain standards, verifying security features, performance, and expertise.
The official recognition that a system, product, or individual meets specified requirements or standards. For a system or product, this might involve a thorough assessment of its security features, performance, and reliability. For an individual, it could mean they have demonstrated a certain level of expertise or competence. Accreditation enhances trustworthiness, promotes quality and Consistency, and provides a benchmark for comparison.
For more information, view this lecture on Data Security Frameworks. Or visit this Wikipedia page.
Define:
Accreditation of IT Systems
The formal approval verifying that a system meets specific security, functionality, and reliability standards, critical for system trustworthiness.
The formal approval process that a system undergoes to verify that it adheres to a set of predefined standards or guidelines, often related to security, functionality, and reliability. During accreditation, various aspects, such as design, implementation, and operating procedures, are evaluated to ensure compliance. This process enhances confidence in the system’s capabilities and its adherence to necessary norms while also identifying areas of potential improvement.
For more information, view this lecture on Data Security Frameworks. Or visit this Wikipedia page.
Define:
Accrediting Authority
An organization or body authorized to grant accreditation, ensuring quality and compliance with required standards.
An entity, often a recognized body or organization, which has the power to grant accreditation to systems, products, or individuals. The authority conducts or oversees assessments to verify compliance with specified requirements or standards. Their role is crucial in maintaining standards of quality, performance, and security, and their endorsement serves as a mark of trust and reliability.
Define:
Acoustic Side-Channel Attack
An attack that exploits sound produced by a device to extract sensitive information, highlighting the need for comprehensive security measures.
An attack method that exploits sound waves produced by a device during its operation to extract sensitive information. By analyzing noises such as keystrokes or fan vibrations, an attacker may be able to infer user inputs, system states, or other confidential data. These attacks highlight the need for comprehensive security measures that consider not just digital but also physical and environmental aspects of system operation.
Or visit this Wikipedia page.
Define:
Active Directory
A Microsoft directory service for central management of user accounts and access controls in Windows environments.
A directory service developed by Microsoft that provides a centralized and secure platform for managing user accounts, network resources, and access controls in a Windows environment. This concept is commonly used in enterprise IT environments to simplify users, manage permissions, and enforce security policies. Examples of Active Directory features include group policy management, authentication and authorization, and domain-based naming and organization.
For more information, view this lecture on Authentication Protocols - Part 2. Or visit this Wikipedia page.
Define:
Active Sniffing
A method where an attacker inserts themselves into network traffic to intercept or alter data, detectable due to the intervention in communication.
A method of data interception in IT and Cybersecurity where the attacker actively inserts themselves into a network to intercept and possibly alter data packets passing through the network. Unlike passive sniffing, where the attacker is silent and only listens to network traffic, active sniffing usually involves techniques that can influence or modify the flow of data, such as ARP spoofing, DHCP attacks, or MAC flooding. Active sniffing is detectable due to the intervention in the network communication.
Define:
ActiveX
A Microsoft framework for interactive web-based applications, previously used in browsers for functionalities like video playback and games, now less common due to security concerns.
A software framework developed by Microsoft that allows for the creation of interactive web-based applications. It is commonly used in Internet Explorer and other web browsers to provide enhanced functionality and interactivity. Examples of ActiveX controls include video players, PDF viewers, and web-based games. Due to security concerns and the advent of newer technologies, the use of ActiveX has significantly declined and is supported by fewer browsers.
For more information, view this lecture on Web Architecture and Attacks. Or visit this Wikipedia page.
Define:
Adaptive Security Architecture
Adaptive Security Architecture is a proactive cybersecurity framework that evolves defenses based on real-time alerts, intelligence, and predictive analytics, continuously adjusting to emerging threats and vulnerabilities.
Adaptive Security Architecture involves designing systems that dynamically monitor networks, endpoints, and applications, analyzing data to respond rapidly to new threats. By consolidating threat intelligence, security controls, and incident response processes, this architecture leverages automation and machine learning to detect and mitigate attacks. Continuously verifying security assumptions, the framework updates policies, configurations, and access privileges as the situation changes. This approach improves resilience, lowers risks, and allows organizations to maintain a more agile security posture in an evolving threat landscape.
Define:
Address Bus
A set of wires on a computer’s motherboard that carries the memory location addresses from the CPU to memory, enabling CPU-memory communication.
A set of wires in a computer’s motherboard that carries the address of a memory location to be accessed. It is used to enable communication between the CPU and memory modules. Examples include the 16-bit address bus in early PCs and the 64-bit address bus in modern computers.
Or visit this Wikipedia page.
Define:
Advanced Encryption Standard
(AES)
A widely accepted symmetric encryption standard used for securing data, with key sizes of 128, 192, or 256 bits, in various applications to protect sensitive information.
A widely used symmetric encryption standard adopted by the U.S. government and numerous organizations worldwide. It operates on blocks of data and uses a secret key that can be 128, 192, or 256 bits in length. With its strong security properties and efficient performance, AES is an integral part of many protocols and systems for securing data in transit and at rest, making it a fundamental element in safeguarding sensitive information against unauthorized access.
For more information, view this lecture on Symmetric Encryption- Part 2. Or visit this Wikipedia page.
Define:
Adversary
An entity or individual that aims to compromise system security for malicious purposes such as financial gain, espionage, or disruption.
An individual, group, or entity that seeks to compromise the security of a system, network, or organization for malicious purposes. Adversaries may have various motivations, including financial gain, espionage, disruption of services, or the achievement of political or ideological goals. They can employ a range of tactics, techniques, and procedures, from brute force attacks and phishing to more sophisticated methods like advanced persistent threats.
Or visit this Wikipedia page.
Define:
Adware
Software that automatically displays or downloads advertising material, which can impact system performance and privacy, and may include unauthorized data collection.
A type of software that displays or downloads advertising content, often without the user’s consent. While not always malicious, adware can negatively impact user experience by consuming system resources, causing slowdowns, and inundating the user with unwanted ads. Some forms of adware may also track user behavior or collect personal data without appropriate disclosure, posing privacy risks.
Or visit this Wikipedia page.
Define:
Agent
A software entity that performs actions or tasks on behalf of users or other programs, often found in network management and security operations.
A software program that performs a specific task on behalf of a user or another program. It is commonly used in distributed computing systems, where multiple agents communicate and coordinate to accomplish a larger goal. For example, an agent on a network may monitor traffic and alert a security administrator of any potential threats.
Define:
Aggregation
The process of combining data from multiple sources into a single dataset, used to provide a comprehensive view and facilitate analysis and reporting.
The process of combining multiple data sources or objects into a single, more comprehensive representation. It is used in data analysis and reporting to provide a more comprehensive view of a specific topic or phenomenon. For example, an aggregation of sales data may show overall trends and patterns across different regions or product categories.
For more information, view this lecture on Database Security.
Define:
Alert
A notification triggered by a security system indicating a detected event or condition that may constitute a security concern, prompting further investigation or action.
A notification generated by a security system in response to a detected event or condition that may indicate a potential security issue. Alerts are designed to draw attention to anomalies, such as attempted unauthorized access, suspicious network traffic, or deviations from normal system behavior. They play a crucial role in incident response by enabling timely detection and remediation of security incidents.
For more information, view this lecture on SIEM and SOAR Systems. Or visit this Wikipedia page.
Define:
Alert Situation
A condition flagged by a security system indicating a potential issue that requires immediate attention, like malware detection or unusual activity.
A state or condition identified by a security system where immediate attention may be required due to the potential for a security issue. An alert situation could be triggered by a variety of events, such as the detection of malware, multiple failed login attempts, or abnormal user activity. These situations typically require evaluation by a security analyst to determine the appropriate response.
For more information, view this lecture on SIEM and SOAR Systems.
Define:
Algebraic Attack
A cryptanalysis approach targeting cryptographic algorithms by formulating and solving algebraic equations to uncover encryption keys or plaintext.
A type of cryptanalysis that attacks cryptographic algorithms by describing their operations as systems of algebraic equations. Solving these equations can potentially reveal the secret keys used. Algebraic attacks are particularly relevant for certain types of encryption algorithms, and understanding these attacks is important for designing robust cryptographic systems.
Define:
Algorithm
A well-defined step-by-step procedure used in computing for tasks like data processing, calculation, and automated reasoning, forming the basis of all computer programs.
A step-by-step procedure or formula for solving a problem or accomplishing some objective. In computing and mathematics, an algorithm is a finite sequence of well-defined instructions typically used for calculation, data processing, and automated reasoning. Algorithms are the foundation of all computer programs, and they determine the approach a computer takes to perform a specific task, such as sorting data, finding the shortest path in a network, or encrypting information. They can range from simple procedures, like a recipe for baking a cake, to complex operations, such as those used in machine learning and artificial intelligence.
For more information, view this lecture on Introduction to Cryptography- Part 1. Or visit this Wikipedia page.
Define:
Analytic Attack
A cybersecurity technique where attackers attempt to break encryption by exploiting weaknesses in the cryptographic algorithm to gain access to plaintext data.
A technique in cybersecurity where a threat actor attempts to decipher encrypted data by exploiting weaknesses in the cryptographic algorithm. Rather than using brute force to try every possible key, the attacker analyzes the encryption structure to find patterns or inherent flaws that can reveal the plaintext or key. This approach is more sophisticated and often faster than attempting exhaustive key searches.
Define:
Analytical Technique
A systematic approach to problem-solving or decision-making by analyzing data, used in security to detect threats and prevent attacks through methods like statistical analysis.
A method of solving problems or making decisions by collecting, organizing, and analyzing data. It is commonly used in security to identify trends and patterns in data, such as network traffic or user behavior, to detect potential threats and prevent attacks. Examples include statistical analysis, data mining, and computational modeling.
For more information, view this lecture on Database Security. Or visit this Wikipedia page.