Study 3 Flashcards
what are the 5 DRP tests?
- Read-Through Test
- Structured Walk-Through Test
- Simulation test
- Parallel Test
- Full-Interruption Test
Common IP Header Protocol field values for ICMP IGMP TCP UDP
Common IP Header Protocol field values are: ICMP=1 IGMP=2 TCP= 6 UDP=17
private Labels
Confidential
Private
Sensitive
Public
private Labels damage per label:
Confidential = Destroy
Private = Significant
Sensitive =Negative Impact
Public = No impact
DOD Labels damage per label:
Top Secret = Grave
Secret = Critical
Confidential = Serious
Unclassified = No effect
At which of the basic phases of the System Development Life Cycle are security requirements formalized?
Functional Requirements Definition
a special purpose computer on a network specifically designed and configured to withstand attacks
bastion host
In a database management system (DBMS), what is the “cardinality?”
The number of rows in a relation
In a database management system (DBMS), what is the “degree
is the “number” of columns in a relation.
In a database management system (DBMS), what is the “domain of a relation”.
the set of allowable values that an attribute can take.
is a type of polyalphabetic substitution cipher in which a text, typically from a book,
running key cipher
What uses a key of the same length as the message where each bit or character from the plaintext is encrypted by an exclusive or (XOR) operation?
One-time pad
the data portion of each packet is encrypted, encryption within IPSEC is referred to as the encapsulation security payload (ESP), it is ESP that provides confidentiality over the process.
what method?
transport method
in IPsec the ESP payload and its header’s are encrypted. To achieve non-repudiation, an additional authentication header (AH) is applied.
what method?
tunnel mode
What is the Systems Development life cycle 5 steps:
- Initiation
- Acquisition / Development
- implementation
- Operation / Maintenance
- Disposal
What is the Software Development life cycle 5 steps:
- Requirements Gathering
- Design
- Development
- Testing / Validation
- Release / Maintenance
What are the 3 Iterative Development Models
- Spiral Model
- Waterfall Method
- Rapid Application Development (RAD)
Iterative Development Models mean what?
Linear , we can’t go back to previous steps
What are the 3 non-Iterative Development Models
- Agile Method
- New Waterfall Method
- Clean Room
What Development Model uses prototypes and dummy GUI’s
Rapid Application Development (RAD)
Attributes are what in a Data Base?
Columns fields
Foreign Key matches primary keys
Referential Integrity
field values match data type ( no letters in numerical fields
Semantic Integrity
Each Tuple has a non-null primary Key
Entity Integrity
Database Normalization
Removes redundant data
DNS is what type of database
Hierarchical Database
The S/MIME standard is based on the principle of What?
public-key encryption
The SQL three sublanguages:
- Data Definition Language (DDL)
- Data Manipulation Language (DML)
- Data Control Language (DCL)
The SQL sublanguages that is used to create databases, tables, views, and indices (keys) specifying the links between tables.
Data Definition Language (DDL)
The SQL sublanguages that is used to query and extract data, insert new records, delete old records, and update existing records.
Data Manipulation Language (DML)
The SQL sublanguages that is used by System and database administrators to control access to data.
he Data Control Language (DCL)
Secure Sockets Layer (SSL) uses symmetric encryption for encrypting the bulk of the data being sent over the session and it uses asymmetric or public key cryptography for:
Peer Authentication
Kerberos uses a database to keep a copy of
a copy of all of the symmetric/secret keys for the principals
weakness of Kerberos is its
Key Distribution Center (KDC), which represents a single point of failure.
The Exclusionary Rule
that evidence must be gathered legally or it can’t be used.
A Hearsay evidence exception rule is?
business records exception :
The business records created during the ordinary course of business are considered reliable and can usually be brought in under this exception if the proper foundation is laid when the records are introduced into evidence
The hearsay rule concerns with what?
computer-generated evidence
computer-generated is what type of evidence
second-hand evidence
Who of the following is responsible for ensuring that proper controls are in place to address integrity, confidentiality, and availability of IT systems and data?
System and information owners
financial risks can be calculated is by using the formula:
Probability of harm (P) * Magnitude or Harm (M) = Cost of the prevention (C)
Law system is based on the idea of legal precedents and social traditions.
Common Law
? attack attempts to learn or make use of the information from the system but does not affect system resources.
passive attack
?attack attempts to alter system resources to affect their operation
active attack