Security Engineering Domain Flashcards
The design, documentation, and management of the lowest layer of the OSI network model - the physical layer
Cable Plant Management
This model focuses on preventing conflict of interest when a given subject has access to objects with sensitive information associated with two competing parties
Brewer-Nash (The Chinese Wall) Model
Explores the rules that would have to be in place if a subject is granted a certain level of clearance and a particular mode of access
Bell-La Padula Model
A mathematical function that is used in the encryption and decryption processes
Algorithm
Involves randomly arranging the positions of key data areas of a program, including the base of the executable and the positions of the stack, heap and libraries in a process’s memory address space
Address Space Layout Randomization (ASLR)
One-way functions, that is, a process that is much simpler to go in one direction (forward) than go in the other direction (backward or reverse engineering)
Asymmetric Algorithms
A two-dimensional table that allows for individual subjects and objects to be related to each other
Access Control Matrix
Involves the removal of characteristics from an entity in order to easily represent its essential properties
Abstraction
The process of exchanging one letter or byte for another
Subsitution
The science that deals with hidden, disguised, or encrypted communications. It embraces communications security and communications intelligence
Cryptology
The study of techniques for attempting to defeat cryptographic techniques and more generally, information security services
Cryptanalysis
Communications mechanisms hidden from the access control and standard monitoring systems of an information system
Covert Channels
Provides a set of generally accepted processes to assist in maximizing the benefits derived from using information technology (IT) and developing appropriate IT governance
Control Objects for Information and Related Technology (COBIT)
Provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns
Community Cloud Infrastructure
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g, networks, servers, sotrage, applications, and services) that can be rapidly provisioned and released with minimal management
Cloud Computing
The altered form of a plaintect message so as to be unreadable for anyone except the intended recipient
Ciphertext or Cryptogram
An entity trusted by one of more users as an authority in a network that issues, revokes, and manages digital certificates
Certificate Authority (CA)
A repository for information collected from a variety of data sources
Data Warehouse
Maintains activities at different security levels to separate these levels from each other
Data Hiding
The ability to deduce (infer) sensitive or restricted information from observing available information
Inference
The storage of programs or instructions in ROM
Firmware
Focused on setting the long-term strategy for security services in the enterprise
Enterprise Security Architecture (ESA)
Provide authentication of a sender and integrity of a sender’s message
Digital Signatures
A broad range of technologies that grant control and protection to content providers over their own digital media
Digital Rights Management (DRM)
An electronic document that contains the name of an organization of individual, the business address, the digital signature of the certificate authority issuing the certificate, the certificate holder’s public key, a serial number, and the expiration date
Digital Certificate
Provided by mixing up the location of the plaintext throughout the ciphertext
Diffusion
The reverse process from encoding - converting the encoded message back into its plaintext format
Decoding
Accepts an input message of any length and generates, through a one-way operation, a fixed-length output
Hash Function
Used to provide computing services in a small form factor with limited processing power
Embedded Systems