P Flashcards

1
Q

password

A

A sequence of characters used to prove one’s identity. It is used during a logon process and should be highly protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

payment card industry data security standard (PCI DSS)

A

An information security standard for organizations that are involved in payment card transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

penetration

A

A successful attempt at circumventing security controls and gaining access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

penetration testing

A

Penetration testing is a method of evaluating the security of a computer system or network by simulating an attack that a malicious hacker would carry out. This is done so that vulnerabilities and weaknesses can be uncovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

permissions

A

The type of authorized interactions that a subject can have with an object. Examples include read, write, execute, add, modify, and delete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

personnel security

A

The procedures that are established to ensure that all personnel who have access to sensitive information have the required authority as well as appropriate clearances. Procedures confirm a person’s background and provide assurance of necessary trustworthiness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

physical controls

A

Controls that pertain to controlling individual access into the facility and different departments, locking systems and removing unnecessary floppy or CD-ROM drives, protecting the perimeter of the facility, monitoring for intrusion, and checking environmental controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

physical security

A

Controls and procedures put into place to prevent intruders from physically accessing a system or facility. The controls enforce access control and authorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

piggyback

A

Unauthorized access to a system by using another user’s legitimate credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

plaintext

A

In cryptography, the original readable text before it is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

playback attack

A

Capturing data and resending the data at a later time in the hope of tricking the receiving system. This is usually carried out to obtain unauthorized access to specific resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

privacy

A

A security principle that protects an individual’s information and employs controls to ensure that this information is not disseminated or accessed in an unauthorized manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

procedure

A

Detailed step-by-step instructions to achieve a certain task, which are used by users, IT staff, operations staff, security members, and others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

protection ring

A

An architecture that provides hierarchies of privileged operation modes of a system, which gives certain access rights to processes that are authorized to operate in that mode. Supports the integrity and confidentiality requirements of multitasking operating systems and enables the operating system to protect itself from user programs and rogue processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

protocol

A

A set of rules and formats that enables the standardized exchange of information between different systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

pseudo-flaw

A

An apparent loophole deliberately implanted in an operating system or program as a trap for intruders.

17
Q

public key encryption

A

A type of encryption that uses two mathematically related keys to encrypt and decrypt messages. The private key is known only to the owner, and the public key is available to anyone.

18
Q

public key infrastructure (PKI)

A

A framework of programs, procedures, communication protocols, and public key cryptography that enables a diverse group of individuals to communicate securely.

19
Q

purge

A

The removal of sensitive data from a system, storage device, or peripheral device with storage capacity at the end of a processing period. This action is performed in such a way that there is assurance proportional to the sensitivity of the data that the data cannot be reconstructed.