Glossary of Terms Page 3 Flashcards

1
Q

ARP poisoning

A

An attack on the ARP table where values are changed to result in misdirected traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

asset

A

A resource or information that an organization needs to conduct business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

asset value (AV)

A

The value of an asset that is at risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

asymmetric encryption

A

Also called public key cryptography, a data encryption system that uses two mathematically derived keys to encrypt and decrypt a message–a public key, available to everyone, and a private key, available to only the owner of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

audit trail

A

A set of records or events, generally organized chronologically, that records what activity has occurred on a system. These records (often computer files) are often used in an attempt to re-create what took place when a security incident occurred, and they can also be used to detect possible intruders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

auditing

A

Actions or processes used to verify the assigned privileges and rights of a user, or any capabilities used to create and maintain a record showing who accessed a particular system and what actions they performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

authentication

A

The process by which a subjects (such as a user’s) identity is verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication, Authorization, Accounting (AAA)

A

Three common functions performed upon system logic. Authentication and authorization almost always occur, with accounting being somewhat less common. Authentication and authorization are part of the access control system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication Header (AH)

A

A portion of the IPsec, security protocol that provides authentication services and replay-detection ability. AH can be used either by itself or Encapsulating Security Payload (ESP). Refer to RFC 2402.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

availability

A

Part of the “CIA” of security, applies to hardware, software, and data specifically meaning that each of these should be present and accessible when the subject (the user) wants to access or use them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

backdoor

A

A hidden method used to gain access to a computer system, network, or application. Often used by software developers to ensure unrestricted access to the system they create. Synonymous with trapdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

backup

A

Refers to copying and storing data in a secondary location, separate from the original, to preserve the data in the event that the original is lost, corrupted, or destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

baseline

A

A system or software as it is built and functioning at a specific point in time. Serves as a foundation for comparison or measurement, providing the necessary visibility to control change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly