SSCP Glossary of Terms Flashcards
6to4
Transition mechanism for migrating from IPv4 to IPv6. It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network.
Absolute Addresses
Hardware addresses used by the CPU
Abstraction
The capability to suppress unnecessary details so the important, inherent properties can be examined and reviewed.
Accepted Ways for Handling Risk
Accept, Transfer, Mitigate, Avoid
Access
The flow of information between a subject and an object.
AC Matrix
Table of subjects and objects indicating what actions individual subjects can take upon individual objects.
AC Model
Framework that dictates how subjects access objects.
Access Controls
Security features that control how users and systems communicate and interact with others systems and resources.
Accreditation
Formal acceptance of the adequacy of a system’s overall security by management.
Active Attack
Attack where the attacker does interact with processing or communication activities.
ActiveX
Microsoft Technology composed of a set of OOP technologies and tolls based on COM and DCOM.
Framework for defining reusable software components in a programming language-independent manner.
Address Bus
Physical connections between processing components and memory segments used to communicate the physical memory addresses begin used during processing procedures.
ARP
ADDRESS RESOLUTION PROTOCOL
Networking protocol used for resolution of network layer IP addresses into link layer MAC Addresses
ASLR
ADDRESS SPACE LAYOUT RANDOMIZATION
Memory protection mechanism used by some operating systems. The addresses used by components of a process are randomized so that it is harder for an attacker to exploit specific memory vulnerabilities.
Algebraic Attack
Cryptoanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions.
Algorithm
Set of mathematical and logic rules used in cryptographic functions.
Analog Signals
Continuously varying electromagnetic wave that represents and transmits data.
Analytic Attack
Cryptanalysis attack that exploits vulnerabilities within the algorithm structure.
ALE
ANNUALIZED LOSS EXPECTANCY
Annual expected loss if a specific vulnerability is exploited and how ti affects a single assest.
SLE x ARO = ALE
API
APPLICATION PROGRAMMING INTERFACE
Software interface that enables process-to-process interaction.
ALU
ARITHMETIC LOGIC UNIT
A component of the computer’s processing unit in which arithmetic and matching operations are performed.
AZ/NZS 4360
Australia and NZ business risk management approach
Assemblers
Tools that convert assembly code into the necessary machine-compatible binary language for processing activities to take place.
Assembly Language
A low-level programming language that is the mnemonic representation of machine-level instructions.