S Flashcards
safeguard
A software configuration, hardware, or procedure that eliminates a vulnerability or reduces the risk of a threat agent from being able to exploit a vulnerability. Also called a countermeasure or control.
sandboxing
A type of control that isolates processes from the operating system to prevent security violations.
secure configuration management
Implementing the set of appropriate procedures to control the life cycle of an application, document the necessary change control activities, and ensure that the changes will not violate the security policy.
Security Assertion Markup Language (SAML)
An XML standard that allows the exchange of authentication and authorization data to be shared between security domains.
security evaluation
Assesses the degree of trust and assurance that can be placed in systems for the secure handling of sensitive information.
security kernel
The hardware, firmware, and software elements of a trusted computing base (TCB) that implement the reference monitor concept. The kernel must mediate all access between subjects and objects, be protected from modification, and be verifiable as correct.
security label
An identifier that represents the security level of an object.
security perimeter
An imaginary boundary between the components within the trusted computing base (TCB) and mechanisms that do not fall within the TCB. It is the distinction between trusted and untrusted processes.
security policy
Documentation that describes senior management’s directives toward the role that security plays within the organization. It provides a framework within which an organization establishes needed levels of information security to achieve the desired confidentiality, availability, and integrity goals. A policy is a statement of information values, protection responsibilities, and organization commitment managing risks.
security testing
Testing all security mechanisms and features within a system to determine the level of protection they provide. Security testing can include penetration testing, formal design and implementation verification, and functional testing.
sensitive information
Information that would cause a negative effect on the company if it were lost or compromised.
sensitivity label
A piece of information that represents the security level of an object. Sensitivity labels are used by the TCB as the basis for mandatory access control (MAC) decisions.
separation of duties
A security principle that splits up a critical task among two or more individuals to ensure that one person cannot complete a risky task by himself.
shoulder surfing
When a person looks over another person’s shoulder and watches keystrokes or watches data as it appears on the screen in order to uncover information in an unauthorized manner.
simple security property
A Bell-LaPadula security model rule that stipulates that a subject cannot read data at a higher security level.