L Flashcards

1
Q

lattice-based access control model

A

A mathematical model that allows a system to easily represent the different security levels and control access attempts based on those levels. Every pair of elements has a highest lower bound and a lowest upper bound of access rights. The classes stemmed from military designations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

least privilege

A

The security principle that requires each subject to be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error, or unauthorized use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

life-cycle assurance

A

Confidence that a trusted system is designed, developed, and maintained with formal designs and controls. This includes design specification and verification, implementation, testing, configuration management, and distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lightweight Directory Access Protocol (LDAP)

A

A directory service based on a subset of the X.500 standard that allows users and applications to interact with a directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

link encryption

A

A type of encryption technology that encrypts packets’ headers, trailers, and the data payload. Each network communications node, or hop, must decrypt the packets to read its address and routing information and then re-encrypt the packets. This is different from end-to-end encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

logic bomb

A

A malicious program that is triggered by a specific event or condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

loss potential

A

The potential losses that can be accrued if a threat agent actually exploits a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly