Security Engineering Flashcards
Ability to deduce (infer) sensitive or restricted information from observing available information.
Inference
Primarily concerned with how subjects and objects are created, assigned rights or privileges, and how ownership is managed.
Graham-Denning
Defines the organizational structure and skill requirements of an IT Org as well as the set of operational procedures & practices that direct IT operations & infrastructure, including information Security operations
IT Infrastructure Library (ITIL)
Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password
Key Space
Formula to determine how many keys in PKI environment
N(N-1)/2
The size of the key, usually measured in bits or bytes, which a cryptographic algorithm used in ciphering or deciphering protected information.
Key Length
Performs certificate registration services on behalf of a CA
Registration Authority (RA)
Involves the removal of characteristics from an entity in order to easily represent its essential properties
Abstraction
The study of techniques for attempting to defeat cryptography techniques and information security services
Cryptoanalysis
Smart networked systems with embedded sensors, processors, & actuators that are designed to sense & interact with the physical world & support real-time, guaranteed performance in safety-critical apps
Cyber-Physical Systems
Maintains activities at different security levels to separate these levels from each other
Data Hiding
The science that deals with hidden, disguised, or encrypted communications. It embraces communications security & communications intelligence
Cryptology
A repository for information collected from a variety of data sources.
Data Warehouse
Electronic document that contains the name of an Org or individual, business address, digital signature of the CA issuing the certificate, the certificate holder’s public key, a serial number, & expiration date
Digital Signature
Provided by mixing up the location of the plaintext throughout the ciphertext
Diffusion
The reverse process from encoding-converting the encoded message back into its plaintext format
Decoding
Attempt to take advantage of how a system handles multiple requests
State Attacks
Holistic life cycle for developing security architecture that begins with assessing business requirements & subsequently creating a “chain of traceability” through the phases of strategy, concept, design, implementation, & metrics
Sherwood Applied Business Security Architecture Framework (SABSA)
Diving a computer’s memory into segments
Segmentation