S Flashcards

1
Q

safeguard

A

A software configuration, hardware, or procedure that eliminates a vulnerability or reduces the risk of a threat agent from being able to exploit a vulnerability. Also called a countermeasure or control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

sandboxing

A

A type of control that isolates processes from the operating system to prevent security violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

secure configuration management

A

Implementing the set of appropriate procedures to control the life cycle of an application, document the necessary change control activities, and ensure that the changes will not violate the security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Assertion Markup Language (SAML)

A

An XML standard that allows the exchange of authentication and authorization data to be shared between security domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

security evaluation

A

Assesses the degree of trust and assurance that can be placed in systems for the secure handling of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

security kernel

A

The hardware, firmware, and software elements of a trusted computing base (TCB) that implement the reference monitor concept. The kernel must mediate all access between subjects and objects, be protected from modification, and be verifiable as correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security label

A

An identifier that represents the security level of an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

security perimeter

A

An imaginary boundary between the components within the trusted computing base (TCB) and mechanisms that do not fall within the TCB. It is the distinction between trusted and untrusted processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

security policy

A

Documentation that describes senior management’s directives toward the role that security plays within the organization. It provides a framework within which an organization establishes needed levels of information security to achieve the desired confidentiality, availability, and integrity goals. A policy is a statement of information values, protection responsibilities, and organization commitment managing risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

security testing

A

Testing all security mechanisms and features within a system to determine the level of protection they provide. Security testing can include penetration testing, formal design and implementation verification, and functional testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

sensitive information

A

Information that would cause a negative effect on the company if it were lost or compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

sensitivity label

A

A piece of information that represents the security level of an object. Sensitivity labels are used by the TCB as the basis for mandatory access control (MAC) decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

separation of duties

A

A security principle that splits up a critical task among two or more individuals to ensure that one person cannot complete a risky task by himself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

shoulder surfing

A

When a person looks over another person’s shoulder and watches keystrokes or watches data as it appears on the screen in order to uncover information in an unauthorized manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

simple security property

A

A Bell-LaPadula security model rule that stipulates that a subject cannot read data at a higher security level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

single loss expectancy (SLE)

A

A dollar amount that is assigned to a single event that represents the company’s potential loss amount if a specific threat were to take place.

asset value × exposure factor = SLE

17
Q

single sign-on (SSO)

A

A technology that allows a user to authenticate one time and then access resources in the environment without needing to reauthenticate.

18
Q

social engineering

A

The act of tricking another person into providing confidential information by posing as an individual who is authorized to receive that information.

19
Q

software-defined networking (SDN)

A

An approach to networking that relies on distributed software to provide improved agility and efficiency by centralizing the configuration and control of networking devices.

20
Q

spoofing

A

Presenting false information, usually within packets, to trick other systems and hide the origin of the message. This is usually done by hackers so that their identity cannot be successfully uncovered.

21
Q

standards

A

Rules indicating how hardware and software should be implemented, used, and maintained. Standards provide a means to ensure that specific technologies, applications, parameters, and procedures are carried out in a uniform way across the organization. They are compulsory.

22
Q

star property (*-property)

A

A Bell-LaPadula security model rule that stipulates that a subject cannot write data to an object at a lower security level.

23
Q

strategic goals

A

Long-term goals that are broad, general statements of intent. Operational and tactical goals support strategic goals and all are a part of a planning horizon.

24
Q

subject

A

An active entity, generally in the form of a person, process, or device, that causes information to flow among objects or that changes the system state.

25
Q

supervisor state

A

One of several states in which an operating system may operate, and the only one in which privileged instructions may be executed by the CPU.

26
Q

supervisory control and data acquisition (SCADA)

A

A system for remotely monitoring and controlling physical systems such as power and manufacturing plants.

27
Q

synthetic transaction

A

A transaction that is executed in real time by a software agent to test or monitor the performance of a distributed system.