Glossary Flashcards
Access
A subject’s ability to view, modify, or communicate with an object. Access enables the flow of information between the subject and the object.
access control
Mechanisms, controls, and methods of limiting access to resources to authorized subjects only.
access control list (ACL)
A list of subjects that are authorized to access a particular object. Typically, the types of access are read, write, execute, append, modify, delete, and create.
access control mechanism
Administrative, physical, or technical control that is designed to detect and prevent unauthorized access to a resource or environment.
Accountability
A security principle indicating that individuals must be identifiable and must be held responsible for their actions
Accredited
A computer system or network that has received official authorization and approval to process sensitive data in a specific operational environment. There must be a security evaluation of the system’s hardware, software, configurations, and controls by technical personnel.
add-on security
Security protection mechanisms that are hardware or software retrofitted to a system to increase that system’s protection level.
administrative controls
Security mechanisms that are management’s responsibility and referred to as “soft” controls. These controls include the development and publication of policies, standards, procedures, and guidelines; the screening of personnel; security-awareness training; the monitoring of system activity; and change control procedures.
Aggregation
The act of combining information from separate sources of a lower classification level that results in the creation of information of a higher classification level, which the subject does not have the necessary rights to access.
AIC triad
The three security principles: availability, integrity, and confidentiality. Sometimes also presented as CIA: confidentiality, integrity, and availability.
annualized loss expectancy (ALE)
A dollar amount that estimates the loss potential from a risk in a span of a year.
single loss expectancy (SLE) × annualized rate of occurrence (ARO) = ALE
antimalware
Software whose principal functions include the identification and mitigation of malware; also known as antivirus, although this term could be specific to only one type of malware.
annualized rate of occurrence (ARO)
The value that represents the estimated possibility of a specific threat taking place within a one-year timeframe.
assurance
A measurement of confidence in the level of protection that a specific security control delivers and the degree to which it enforces the security policy.
attack
An attempt to bypass security controls in a system with the mission of using that system or compromising it. An attack is usually accomplished by exploiting a current vulnerability.
attribute-based access control (ABAC)
An access control model in which access decisions are based on attributes of any component of or action on the system.
audit
A systematic assessment of significant importance to the organization that determines whether the system or process being audited satisfies some external standards.
audit trail
A chronological set of logs and records used to provide evidence of a system’s performance or activity that took place on the system. These logs and records can be used to attempt to reconstruct past events and track the activities that took place, and possibly detect and identify intruders.
authenticate
To verify the identity of a subject requesting the use of a system and/or access to network resources. The steps to giving a subject access to an object should be identification, authentication, and authorization.
authorization
Granting access to an object after the subject has been properly identified and authenticated.
availability
The reliability and accessibility of data and resources to authorized individuals in a timely manner.
back door
An undocumented way of gaining access to a computer system. After a system is compromised, an attacker may load a program that listens on a port (back door) so that the attacker can enter the system at any time. A back door is also referred to as a trapdoor.
back up
Copy and move data to a medium so that it may be restored if the original data is corrupted or destroyed. A full backup copies all the data from the system to the backup medium. An incremental backup copies only the files that have been modified since the previous backup. A differential backup backs up all files since the last full backup.
baseline
The minimum level of security necessary to support and enforce a security policy.
Bell-LaPadula model
The model uses a formal state transition model that describes its access controls and how they should perform. When the system must transition from one state to another, the security of the system should never be lowered or compromised. See also multilevel security, simple security property, and star property (*-property).
Biba model
A formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.
biometrics
When used within computer security, identifies individuals by physiological characteristics, such as a fingerprint, hand geometry, or pattern in the iris.
blacklist
A set of known-bad resources such as IP addresses, domain names, or applications.
browsing
Searching through storage media looking for specific information without necessarily knowing what format the information is in. A browsing attack is one in which the attacker looks around a computer system either to see what looks interesting or to find specific information.
brute-force attack
An attack that continually tries different inputs to achieve a predefined goal, which can be used to obtain credentials for unauthorized access.
business impact analysis (BIA)
A functional analysis in which a team collects data, documents business functions, develops a hierarchy of business functions, and applies a classification scheme to indicate each individual function’s criticality level.
callback
A procedure for identifying a system that accessed an environment remotely. In a callback, the host system disconnects the caller and then dials the authorized telephone number of the remote terminal in order to reestablish the connection. Synonymous with dialback.
capability
A capability outlines the objects a subject can access and the operations the subject can carry out on the different objects. It indicates the access rights for a specific subject; many times, the capability is in the form of a ticket.
capability maturity model integration (CMMI)
A process model that captures the organization’s maturity and fosters continuous improvement.
certification
The technical evaluation of the security components and their compliance for the purpose of accreditation. A certification process can use safeguard evaluation, risk analysis, verification, testing, and auditing techniques to assess the appropriateness of a specific system processing a certain level of information within a particular environment. The certification is the testing of the security component or system, and the accreditation is the approval from management of the security component or system.
challenge/response method
A method used to verify the identity of a subject by sending the subject an unpredictable or random value. If the subject responds with the expected value in return, the subject is authenticated.
change management
A business process aimed at deliberately regulating the changing nature of business activities such as projects.
ciphertext
Data that has been encrypted and is unreadable until it has been converted into plaintext.
Clark-Wilson model
An integrity model that addresses all three integrity goals: prevent unauthorized users from making modifications, prevent authorized users from making improper modifications, and maintain internal and external consistency through auditing.
classification
A systematic arrangement of objects into groups or categories according to a set of established criteria. Data and resources can be assigned a level of sensitivity as they are being created, amended, enhanced, stored, or transmitted. The classification level then determines the extent to which the resource needs to be controlled and secured, and is indicative of its value in terms of information assets.
cleartext
In data communications, cleartext is the form of a message or data, which is transferred or stored without cryptographic protection.
cloud computing
The use of shared remote computing devices for the purpose of providing improved efficiencies, performance, reliability, scalability, and security.
collusion
Two or more people working together to carry out a fraudulent activity. More than one person would need to work together to cause some type of destruction or fraud; this drastically reduces its probability.
communications security
Controls in place to protect information as it is being transmitted, especially by telecommunications mechanisms.
compartment
A class of information that has need-to-know access controls beyond those normally provided for access to confidential, secret, or top-secret information. A compartment is the same thing as a category within a security label. Just because a subject has the proper clearance does not mean it has a need to know. The category, or compartment, of the security label enforces the subject’s need to know.
compensating controls
Controls that are alternative procedures designed to reduce the risk. They are used to “counterbalance” the effects of an internal control weakness.
compromise
A violation of the security policy of a system or an organization such that unauthorized disclosure or modification of sensitive information occurs.
computer fraud
Computer-related crimes involving deliberate misrepresentation, modification, or disclosure of data in order to compromise a system or obtain something of value.
confidentiality
A security principle that works to ensure that information is not disclosed to unauthorized subjects.
configuration management
An operational process aimed at ensuring that systems and controls are configured correctly and are responsive to the current threat and operational environments.
confinement
Controlling information in a manner that prevents sensitive data from being leaked from a program to another program, subject, or object in an unauthorized manner.
content distribution network
Multiple servers distributed across a large region, each of which provides content that is optimized for users closest to it. These networks are not only used to improve the user experience but also to mitigate the risk of denial-of-service attacks.
contingency plan
A plan put in place before any potential emergencies, with the mission of dealing with possible future emergencies. It pertains to training personnel, performing backups, preparing critical facilities, and recovering from an emergency or disaster so that business operations can continue.
continuous monitoring
Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.
control zone
The space within a facility that is used to protect sensitive processing equipment. Controls are in place to protect equipment from physical or technical unauthorized entry or compromise. The zone can also be used to prevent electrical waves carrying sensitive data from leaving the area.
converged protocol
Protocols that started off independent and distinct from one another but over time converged to become one.
copyright
A legal right that protects the expression of ideas.
cost/benefit analysis
An assessment that is performed to ensure that the cost of a safeguard does not outweigh the benefit of the safeguard. Spending more to protect an asset than the asset is actually worth does not make good business sense. All possible safeguards must be evaluated to ensure that the most security-effective and cost-effective choice is made.
countermeasure
A control, method, technique, or procedure that is put into place to prevent a threat agent from exploiting a vulnerability. A countermeasure is put into place to mitigate risk. Also called a safeguard or control.
covert channel
A communications path that enables a process to transmit information in a way that violates the system’s security policy.
covert storage channel
A covert channel that involves writing to a storage location by one process and the direct or indirect reading of the storage location by another process. Covert storage channels typically involve a resource (for example, sectors on a disk) that is shared by two subjects at different security levels.
covert timing channel
A covert channel in which one process modulates its system resource (for example, CPU cycles), which is interpreted by a second process as some type of communication.
cryptanalysis
The practice of breaking cryptosystems and algorithms used in encryption and decryption processes.
cryptography
The science of secret writing that enables storage and transmission of data in a form that is available only to the intended individuals.
cryptology
The study of cryptography and cryptanalysis.
data at rest
Data that resides in external or auxiliary storage devices such as hard disk drives, solid-state drives, or DVDs.
data classification
Assignments to data that indicate the level of availability, integrity, and confidentiality that is required for each type of information.
data custodian
An individual who is responsible for the maintenance and protection of the data. This role is usually filled by the IT department (usually the network administrator). The duties include performing regular backups of the data; implementing security mechanisms; periodically validating the integrity of the data; restoring data from backup media; and fulfilling the requirements specified in the company’s security policy, standards, and guidelines that pertain to information security and data protection.
Data Encryption Standard (DES)
Symmetric key encryption algorithm that was adopted by the government as a federal standard for protecting sensitive unclassified information. DES was later replaced with Advanced Encryption Standard (AES).
data in transit (or data in motion)
Data that is moving between computing nodes over a data network such as the Internet.
data in use
Data that temporarily resides in primary storage such as registers, caches, or RAM while the CPU is using it.
data leak prevention (DLP)
The actions that organizations take to prevent unauthorized external parties from gaining access to sensitive data.
data mining
The analysis of the data held in data warehouses in order to produce new and useful information.
data remanence
A measure of the magnetic flux density remaining after removal of the applied magnetic force, which is used to erase data. Refers to any data remaining on magnetic storage media.
data warehousing
The process of combining data from multiple databases or data sources into a large data store for the purpose of providing more extensive information retrieval and data analysis.
database shadowing
A mirroring technology used in databases, in which information is written to at least two hard drives for the purpose of redundancy.
declassification
An administrative decision or procedure to remove or reduce the security classification information.
dedicated security mode
The mode in which a system operates if all users have the clearance or authorization to access, and the need to know about, all data processed within the system. All users have been given formal access approval for all information on the system and have signed nondisclosure agreements pertaining to this information.
degauss
Process that demagnetizes magnetic media so that a very low residue of magnetic induction is left on the media. Used to effectively erase data from media.
Delphi technique
A group decision method used to ensure that each member of a group gives an honest and anonymous opinion pertaining to the company’s risks.
denial of service (DoS)
Any action, or series of actions, that prevents a system, or its resources, from functioning in accordance with its intended purpose.
DevOps
The practice of incorporating developers and members of operations and quality assurance (QA) staff into software development projects to align their incentives and enable frequent, efficient, and reliable releases of software products.
dial-up
The service whereby a computer terminal can use telephone lines, usually via a modem, to initiate and continue communication with another computer system.
dictionary attack
A form of attack in which an attacker uses a large set of likely combinations to guess a secret, usually a password.
digital signature
An electronic signature based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters such that the identity of the signer and the integrity of the data can be verified.
disaster recovery plan
A plan developed to help a company recover from a disaster. It provides procedures for emergency response, extended backup operations, and post-disaster recovery when an organization suffers a loss of computer processing capability or resources and physical facilities.
discretionary access control (DAC)
An access control model and policy that restricts access to objects based on the identity of the subjects and the groups to which those subjects belong. The data owner has the discretion of allowing or denying others access to the resources it owns.
Distributed Network Protocol 3 (DNP3)
A communications protocol designed for use in SCADA systems, particularly those within the power sector, that does not include routing functionality.
domain
The set of objects that a subject is allowed to access. Within this domain, all subjects and objects share a common security policy, procedures, and rules, and they are managed by the same management system.
due care
Steps taken to show that a company has taken responsibility for the activities that occur within the corporation and has taken the necessary steps to help protect the company, its resources, and employees.
due diligence
The process of systematically evaluating information to identify vulnerabilities, threats, and issues relating to an organization’s overall risk.
duress
The use of threats or violence against someone in order to force them to do something they don’t want to do.
egress monitoring
Maintaining awareness of the information that is flowing out of a network, whether it appears to be malicious or not.
electronic discovery (e-discovery)
The process of producing for a court or external attorney all electronically stored information pertinent to a legal proceeding.
electronic vaulting
The transfer of backup data to an offsite location. This process is primarily a batch process of transmitting data through communications lines to a server at an alternative location.
emanations
Electrical and electromagnetic signals emitted from electrical equipment that can transmit through the airwaves. These signals carry information that can be captured and deciphered, which can cause a security breach. These are also called emissions.