Exam Flashcards
NETWORK ASSESSMENT TOOLS
ISS, SATAN, BALLISTA
HDSL
1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM
SODA ACID
SUPPRESSES FUEL SUPPLY
TIME TO SWITCH AND TIME PRESSING KEY
FLIGHT TIME AND DWELL TIME
RED BOOK
NETWORK
GREEN BOOK
PASSWORD MANAGEMENT
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA
100 DEGREES
RED BOX
SOUND OF COINS
BLUE BOX
TONE, FREQ FOR LONG DISTANCE
BLACK BOX
LINE VOLTAGE, RECEIVER’S END
FRAGMENTATION
TEAR DROP
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS
REFERENCE MONITOR
NUMBER OF COLUMNS IN TABLE
DEGREE
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES
SET
MD5 SIZE OF DIGEST
128 BITS
SHA-1 SIZE OF DIGEST
160 BITS
B2
STRUCTURED, SEPARATION OF DUTIES
B3
SECURITY DOMAIN
PASSWORD-TWO UNRELATED WORDS
COMPOSITION
SATISFY REAL WORLD REQUIREMENTS
VALIDATION
DECISION SUPPORT SYSTEM (DSS) PROVIDES
FLEXIBILITY
BEST PROGRAMMING HAS
HIGH COHESION AND LOW COUPLING
COHESION
ONLY ONE PROCESS OR ONLY RELATED PROCESSES
COUPLING
INTERACTION REQUIRED
RISK
LIKELIHOOD
IP HEADER-TCP NUMBER
6
IP HEADER-ICMP NUMBER
1
IP HEADER-IGMP NUMBER
2
IP HEADER-UDP NUMBER
17
IMPORTANT FOR EVIDENCE
CHAIN OF CUSTODY
DATABASE ROWS
TUPLE
NETWORK REDUNDANCY
DUAL BACKBONE
DRAW CONCLUSIONS
INFERENCE
SUSTAINING-DURING AND AFTER
BUSINESS CONTINUITY PLAN
FIRST STEP
POLICY
STEP-BY-STEP
PROCEDURE
RECOMMENDED
GUIDELINES
CONTENT DEPENDENT-ADVANTAGE
MORE GRANULAR
CONTENT DEPENDENT-DISADVANTAGE
OVERHEAD
PROTECT ONLY WITHIN A FEW INCHES
CAPACITANCE DETECTOR
TRANSMIT ONLINE TRANSACTIONS TO REMOTE FACILITY
ELECTRONIC VAULTING
CELL PHONE-PREVENT MONITORING
TIME DIVISION MULTIPLEXING
CCTV IS MAINLY
DETECTIVE
LINUX, PREVENTS USERS FROM SEEING DATA
SHADOW
ORANGE BOOK
TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)
RADIUS-ACT AS CLIENT
NETWORK ACCESS SERVER (NAS)
LOCK PICKING TECHNIQUE FOR COMBINATION LOCKS
SHIMMING
DES NUMBER OF ROUNDS
16
FLEXIBLE SUPPORT FOR O/S
FLASK FLUX ADVANCED SECURITY KERNEL
ID PICTURE, VERIFY AUTHENTICITY ON A DOCUMENT
WATERMARK
PROPER LIFECYCLE OF EVIDENCE
COLLECTION, ANALYSIS, STORAGE, PRESENT IN COURT, RETURN TO OWNER
ALGORITHMS BASED ON DISCRETE LOGARITHMS
EL GAMAL, DIFFIE-HELLMAN, ECC
24 HOURS A DAY PROCESSING, GOOD ALTERNATIVE TO TAPE BACKUP
BACKUP TO JUKEBOX
NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS
10,000 COMBOS
SSO BENEFIT
MORE EFFICIENT LOG-ON
ACCOUNTABILITY=TRACED BACK TO
INDIVIDUAL
IPSEC LAYER AND PROTOCOLS USED
L3, AH AND ESP, ESP=INTEGRITY AND CONFIDENTIALITY
REASONABLE MEASURES TO ENSURE
DUE CARE
LIABILITY
DUE CARE, DUE DILIGENCE
SINGLE UNIT OF ETHERNET DATA
FRAME
1ST STEP IN A PENETRATION TEST
FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES
COVERT CHANNEL
1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES
QUALITATIVE
PRIORITIZES RISK
REGISTERED PORTS
1024-49151
WELL KNOWN PORTS
1-1023
DYNAMIC AND OR PRIVATE PORTS
49152-65535
ISDN BRI
2B AND 1D
WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST
RECEIVER’S PUBLIC KEY
WITH PUBLIC KEY CRYPTOGRAPHY, FOR AUTHENTICATION, WHICH KEY IS USED FIRST
SENDER’S PRIVATE KEY
INTEGRITY
HASHING
GUARDS
DISCRIMINATING JUDGMENT
SSO-TYPES
KERBEROS, SESAME, KRYPTOKNIGHT
KERBEROS
TICKETS, MIT, PROJECT ATHENA, SYMMETRIC, CONFIDENTIAL & INTEGRITY, 3-HEADED DOG, GREEK MYTHOLOGY
EVIDENCE MUST BE
RELEVANT
PACKET FILTERING FIREWALL (GENERATION)
1
APPLICATION LEVEL FIREWALL (GENERATION)
2
STATEFUL INSPECTION FIREWALL(GENERATION)
3
DYNAMIC PACKET FILTERING FIREWALL (GENERATION)
4
KERNEL PROXY FIREWALL (GENERATION)
5
TRINOO/TRIN00
DDOS, TRIBAL FLOOD NETWORK
AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE
FAIL-SAFE
MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN
MANAGEMENT
RESPONSIBLE FOR ENSURING PROPER CONTROLS ARE IN-PLACE FOR DATA
DATA OWNER
SCHEMA
STRUCTURE
RELATION
HOW DATA & SCHEMA ARE RELATED (ASSOCIATED)
DEGREE
NUMBER OF COLUMNS
CARDINALITY
NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER
CONTINGENCY PLAN SHOULD ADDRESS
RESIDUAL RISK
LEAST PRIVILEGE-MODEL
TCSEC
RETROFITTING SECURITY FOR A DATABASE
TRUSTED FRONT-END
SCRAMBLED
TRANSPOSITION
REPLACED
SUBSTITUTION
HIDE IN MEDIA (PICTURES)
STEGANOGRAPHY
EVERY X NUMBER OF WORDS IS PART OF REAL MESSAGE
CONCEALMENT
BOOK, PAGE, PARAGRAPH, ETC?..
RUNNING
CERTIFICATION RULES & ENFORCEMENT RULES (MODEL)
CLARK-WILSON
FORENSIC DISK BACK-UP
BIT LEVEL, BIT-BY-BIT
ADDED TO PASSWORDS TO INCREASE RANDOMNESS
SALTS
RPC OSI LAYER
5 (SESSION)
LOWER CASE
IMPLEMENTATION
MIDDLE CASE
ANALYSIS & DESIGN
UPPER CASE
EXECUTIVES/PLANNING
ICASE
COMBINED (L,M,U) ALSO CALLED INTEGRATED CASE
ARTIFICIAL INTELLIGENCE/LEARN FROM EXPERIENCE
NEURAL NETWORK
AUDIT TRAILS
DETECTIVE/TECHNICAL
HIPPA
SECURITY & PRIVACY
SOFTWARE TESTING (INTERNAL)
WHITE BOX
SOFTWARE TESTING (EXTERNAL)
BLACK BOX
FORMAL ACCEPTANCE
ACCREDITATION
PROPRIETARY & IMPORTANT TO SURVIVAL
TRADE-SECRET
INVALID TRANSACTIONS SHOULD BE
WRITTEN TO REPORT AND REVIEWED
ATTRIBUTES IN A TABLE DEPEND ONLY ON PRIMARY KEY
DATA NORMALIZATION
MAY RENDER TOKEN UNUSABLE
BATTERY LIFESPAN
ACV
ACTUAL COST VALUE, VALUE OF ITEM ON THE DATE OF LOSS + 10 %
SET
VISA, MASTERCARD, INTERNET, CREDIT CARD PROTOCOL, USED DIGITAL SIGNATURES
WAP GAP
WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS
PASSWORD CRACKERS USE
COMPARATIVE ANALYSIS
CHAIN OF CUSTODY SHOWS
WHO: OBTAINED AND SECURED EVIDENCE
DIGITAL SIGNATURE STANDARD(DSS) PROVIDES
INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION
HIGH AVAILABILITY-SERVER
LOAD BALANCING, DISK REPLICATION
ALL RECOVERY PLANS
BECOME OBSOLETE QUICKLY
MAIN REASON FOR CCTV
INCREASE GUARD VISIBILITY
PROTECT AGAINST BRUTE-FORCE ATTACK
ACCOUNT LOCK-OUT AFTER 3 UNSUCCESSFUL ATTEMPTS
FORMAL DESCRIPTION OF SECURITY POLICY
ACCESS CONTROL MODULE
ONE-WAY HASH
DIFFERENT DIGEST FOR DIFFERENT DATA, VARIABLE INPUT-FIXED OUTPUT GIVEN DIGEST, COMPUTATIONALLY INFEASIBLE TO FIND CORRESPONDING MESSAGE
X.509
DIGITAL CERTIFICATES
HOST-BASED IDS-DISADVANTAGE
COSTLY TO MANAGE
SECURITY REQUIREMENT UNIQUE TO COMPARTMENTED WORKSTATION
INFORMATION LABELS
ACT OF VALIDATING USER
AUTHENTICATION
SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR
PRIVATE
PROTECTION PROFILE
COMMON CRITERIA (CC)
ORANGE BOOK
SECURITY TESTING, DESIGN SPECIFICATION & TESTING, TRUSTED DISTRIBUTION, NOT SYSTEM INTEGRITY
MOST SECURE FORM OF 3DES
DES-EDE3
MAC ADDRESS SIZE
48-BIT, ALSO CALLED HARDWARE ADDRESS
IPV4 ADDRESS SIZE IN BITS
32-BIT
MTO
MAXIMUM TOLERABLE DOWNTIME, MAX DELAY BUSINESS CAN TOLERATE & STILL BE VIABLE
ATM
FIXED CELL SIZE
CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL
CHINESE WALL
FACIAL IDENTIFICATION
EIGEN FEATURES OF EIGEN FACES
MAC CATEGORY OF A RESOURCE CAN BE ONLY BE CHANGED BY
ADMINISTRATORS
STATE MACHINE MODEL IS BEST FOR
CONFIDENTIALITY
BELL-LAPADULA (BLP) SECURITY MODE WITH HIGHEST RISK
MULTI-LEVEL
DATA DICTIONARY
CONTROL & MANAGE DATA FROM A CENTRAL LOCATION
TECHNIQUE FOR ARTIFICIAL INTELLIGENCE
CYCLIC-BASED REASONING STATEMENT
NOT EFFECTIVE DETERRENT AGAINST DATABASE INFERENCE ATTACKS
SMALL QUERY SETS
BUSINESS CONTINUITY PLAN DEVELOPMENT DEPENDS ON
BIA
CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT
DUAL CONTROL