Glossary of Terms Page 3 Flashcards
ARP poisoning
An attack on the ARP table where values are changed to result in misdirected traffic.
asset
A resource or information that an organization needs to conduct business
asset value (AV)
The value of an asset that is at risk
asymmetric encryption
Also called public key cryptography, a data encryption system that uses two mathematically derived keys to encrypt and decrypt a message–a public key, available to everyone, and a private key, available to only the owner of the key.
audit trail
A set of records or events, generally organized chronologically, that records what activity has occurred on a system. These records (often computer files) are often used in an attempt to re-create what took place when a security incident occurred, and they can also be used to detect possible intruders.
auditing
Actions or processes used to verify the assigned privileges and rights of a user, or any capabilities used to create and maintain a record showing who accessed a particular system and what actions they performed.
authentication
The process by which a subjects (such as a user’s) identity is verified.
Authentication, Authorization, Accounting (AAA)
Three common functions performed upon system logic. Authentication and authorization almost always occur, with accounting being somewhat less common. Authentication and authorization are part of the access control system.
Authentication Header (AH)
A portion of the IPsec, security protocol that provides authentication services and replay-detection ability. AH can be used either by itself or Encapsulating Security Payload (ESP). Refer to RFC 2402.
availability
Part of the “CIA” of security, applies to hardware, software, and data specifically meaning that each of these should be present and accessible when the subject (the user) wants to access or use them.
backdoor
A hidden method used to gain access to a computer system, network, or application. Often used by software developers to ensure unrestricted access to the system they create. Synonymous with trapdoor.
backup
Refers to copying and storing data in a secondary location, separate from the original, to preserve the data in the event that the original is lost, corrupted, or destroyed.
baseline
A system or software as it is built and functioning at a specific point in time. Serves as a foundation for comparison or measurement, providing the necessary visibility to control change