Unit 10 Flashcards

1
Q

access controller

A

A component used by the security manager to check permissions
belonging to classes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

action (in a policy file)

A

In Java, the part of an entry in a policy file that describes the
kinds of action that may be performed with respect to some target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

application domain

A

A domain containing less privileged (non-system domain)

classes in a protection domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

application gateway

A

A kind of firewall providing a proxy service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

asymmetric cryptography

A

A code in which the encoding key is different from the decoding key, but is related to it in a non-trivial way (an example of this is public key
cryptography).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

audit log

A

A record of the activity on a system that can be used to determine what users have done and to assist recovery in the case of an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

auditing

A

Capturing a secure record of security-related events for non-repudiation, recovery and proof of effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

authentication (identification)

A

The process of determining a user’s or software’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authorisation

A

The process of determining what code is allowed to do, according to how it is signed, what code base it comes from or what caller it is associated with (for example, what user invoked it).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

availability

A

The property of a system that can be used when it is needed by an authorised user or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

block cipher

A

A cipher in which encryption takes place on blocks of plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

brute-force attack

A

An attack in which possible keys are attempted until a correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

buffer overflow

A

The error that occurs when a buffer is assigned more data than it should hold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

certifying authority

A

An organisation that issues a certificate associating a user with a cryptographic key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

challenge

A

A method of authorisation in which the user is presented with a question or other task whose successful completion helps to determine their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

checksum

A

A number used to check the integrity of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

cipher

A

A code, a means of encrypting plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ciphertext

A

The output of a cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

click fraud

A

The fraudulent generation of clicks in order to profit from cost-per-click web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

code base

A

The location of code in terms of its URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

collision

A

A collision occurs in a hash function when two or more inputs generate the same output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

confidentiality

A

The property of a system that ensures that data is visible only to authorised users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

credentials

A

Security information associated with a subject, such as keys or passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

cryptanalysis

A

The science of decoding ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

cryptographic hash function

A

A hash function with desirable properties for

applications in security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

cryptographic service

A

A cryptographic facility provided by implementers of services
for Java’s cryptography API, such as ciphers, message digests and digital signing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

cryptography

A

The science of ciphering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

deciphering (decryption)

A

Converting ciphertext to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

declarative security

A

Using an XML deployment descriptor file to delegate authorisation checks to a container.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

digital certificate

A

An electronic means of associating a user with a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

digital signature

A

An electronic means of signing a communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

digitally signed

A

Having an electronic signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

domain

A

A set of classes with the same permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

end-to-end encryption

A

An approach to network security in which the sending and receiving nodes of a message implement encryption and decryption using a shared key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

exponential

A

Growing according to an exponential relationship; that is, according to a power of a number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

fabrication

A

The construction of false or unauthorised information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

firewall

A

A technology to filter internet traffic between a local and external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

group

A

A collection of authenticated users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

hacker

A

An unauthorised user of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

handshake

A

An exchange of information to establish parameters for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

hash function

A

A one-way function that maps an input to a small output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

hierarchy of trust

A

The relationship in which one or more parties place trust in other parties to perform authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

homograph attack

A

An attack using social engineering in which a name similar to another is used to try to deceive a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

integrity

A

The property of information that it has not been altered by an attacker or otherwise corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

interception

A

Access of information by an unauthorised user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

interruption

A

An attack preventing availability of a resource.

47
Q

key

A

A value used to decipher ciphertext.

48
Q

key space

A

The set of keys associated with a cipher.

49
Q

key stream

A

The generation of changing keys for the encryption of data in a stream cipher.

50
Q

linear

A

Growing according to a linear relationship, that is, by a constant factor for each fixed change in input.

51
Q

link encryption

A

An approach to network security in which each node implements encryption and decryption, each communicating pair using a different shared key.

52
Q

linking

A

The stage at which classes are incorporated into the runtime state of a virtual machine.

53
Q

loading

A

The stage at which classes are located and checked.

54
Q

memory leak

A

Loss of memory areas due to mismanagement of memory.

55
Q

message authentication code (MAC)

A

A code used to check the integrity (and in

some cases identity) of a message.

56
Q

message digest

A

A reduced size version of a message produced by a hash function.

57
Q

middle person

A

An attacker interposed between a sender and receiver in location or time.

58
Q

modification

A

Unauthorised alteration of information.

59
Q

nonce

A

A value used once to defeat replay attacks.

60
Q

non-repudiation

A

The property of a system that prevents users from denying sending or receiving some information or performing some action.

61
Q

one-time pad

A

A cipher with perfect secrecy, invented in 1917.

62
Q

one-way function

A

A function with the property that it is easy to obtain an output from an input, but hard to determine the input given the output.

63
Q

packet

A

The unit of information in network communication.

64
Q

packet filtering

A

A technique allowing only desirable packets to travel across a firewall.

65
Q

perfect secrecy

A

The property of a code in which the ciphertext does not reveal any information about the plaintext or code.

66
Q

permissions

A

Values that determine which actions are authorised within a system.

67
Q

plaintext

A

Communication that has not been subjected to encryption.

68
Q

pointer

A

A memory address that may be manipulated in a variety of ways.

69
Q

policy entry

A
An entry in a policy file describing permissions assigned to a class
according to its code base, signing or principals.
70
Q

polyalphabetic substitution

A

A code in which ciphertext is formed from groups of more than one character at a time.

71
Q

primordial loader

A

The trusted class loader in the JVM which bootstraps the system, loading the main class.

72
Q

principal

A

An identity associated with a subject, such as the subject’s login ID or an organisation’s name.

73
Q

private key

A

A cipher key that is kept secret and is used in conjunction with a public key in asymmetric cryptography.

74
Q

programmatic security

A

Explicit authorisation checks by method invocation.

75
Q

protection domain

A

The interaction of features enforcing security policies in Java, particularly as regards permissions allocated to classes.

76
Q

provider

A

A supplier of cryptographic products.

77
Q

public key

A

A key used in combination with a private key that may be publicised without compromising security of communication.

78
Q

public key cryptography

A

Cryptography in which public and private key pairs are employed; an example of asymmetric cryptography.

79
Q

public key infrastructure (PKI)

A

A system for the association of keys with users and the management of key-related information.

80
Q

realm

A

A set of valid users and groups for an application.

81
Q

reference

A

A memory value that cannot be manipulated, but merely provides access to objects.

82
Q

replay

A

An attack in which intercepted or stored information is reused to gain advantage.

83
Q

role

A

A collection of identities or category of identities with shared permissions.

84
Q

root certificate

A

A certificate granted to a certifying authority.

85
Q

salt

A

A number used to prevent collisions in hash functions and or in general to add variability to the processing of information.

86
Q

secret key

A

A key that must be kept secret, as used in symmetric cryptography.

87
Q

secure channel

A

A communication channel between a pair of processes providing authentication, confidentiality, integrity services and time stamping.

88
Q

security manager (JVM)

A

A component of the JVM concerned with authorisation of what code may or may not do.

89
Q

security policy (JVM)

A

A collection of permissions contained in a policy object, usually determined using policy files.

90
Q

security through obscurity

A

The discredited notion that secrecy of design alone can provide security.

91
Q

session key

A

A key that is used only while a session is in effect and then discarded.

92
Q

singleton

A

A programming design pattern ensuring that only one of an object may exist at a time.

93
Q

social engineering

A

A collection of techniques used to manipulate people into performing actions, or divulging confidential information. The term typically applies to trickery associated with information gathering or accessing computer systems.

94
Q

stateful packet inspection

A

A firewall technique in which the state of a system is used to determine the legality of traffic across a firewall.

95
Q

statically typed

A

Checking typing of variables at compile time.

96
Q

statistical analysis

A

A cryptanalytical technique using patterns of frequency of letters in languages as an aid to deciphering messages.

97
Q

stream cipher

A

A cipher whose key changes frequently to encrypt a stream of data.

98
Q

strong typing

A

Checking for potentially troublesome conversions of types at compile time.

99
Q

subject (for authentication)

A

A grouping of related information for an entity in a

security system, such as a collection of identities (principals) and credentials.

100
Q

substitution

A

A ciphering technique in which one character in a language is substituted for another.

101
Q

symmetric cryptography

A

Cryptography employing a private key or in which the decoding key is trivially related to the coding key.

102
Q

system

A

In the context of security, refers to the hardware, platform, application software and users’ interactions.

103
Q

system domain

A

The collection of classes within a protection domain that are trusted.

104
Q

target

A

An entity to which a permission is applied in a policy file.

105
Q

threat monitoring

A

The active consideration of dangers to a system’s security.

106
Q

time stamping

A

The inclusion of information with a message so that its time of occurrence can be determined.

107
Q

transposition

A

An encryption technique where the order of information in the plaintext is obscured.

108
Q

trapdoor function

A

A one-way function which is reversible if given some secret information.

109
Q

tunnelling

A

Wrapping one protocol in another protocol.

110
Q

type safety

A

The ability of a language to check that types are being used correctly.

111
Q

vector

A

A route by which an attack may occur on a computer system.

112
Q

virtual private network (VPN)

A

A network created by a form of tunnelling in which end-to-end encryption takes place between the two ends of the tunnel, so creating a private network of sorts.

113
Q

web of trust

A

A non-hierarchical approach to establishing trustworthiness of digital certificates.