Unit 10 Flashcards
access controller
A component used by the security manager to check permissions
belonging to classes.
action (in a policy file)
In Java, the part of an entry in a policy file that describes the
kinds of action that may be performed with respect to some target.
application domain
A domain containing less privileged (non-system domain)
classes in a protection domain.
application gateway
A kind of firewall providing a proxy service.
asymmetric cryptography
A code in which the encoding key is different from the decoding key, but is related to it in a non-trivial way (an example of this is public key
cryptography).
audit log
A record of the activity on a system that can be used to determine what users have done and to assist recovery in the case of an attack.
auditing
Capturing a secure record of security-related events for non-repudiation, recovery and proof of effectiveness.
authentication (identification)
The process of determining a user’s or software’s identity.
authorisation
The process of determining what code is allowed to do, according to how it is signed, what code base it comes from or what caller it is associated with (for example, what user invoked it).
availability
The property of a system that can be used when it is needed by an authorised user or application.
block cipher
A cipher in which encryption takes place on blocks of plaintext.
brute-force attack
An attack in which possible keys are attempted until a correct one is found.
buffer overflow
The error that occurs when a buffer is assigned more data than it should hold.
certifying authority
An organisation that issues a certificate associating a user with a cryptographic key.
challenge
A method of authorisation in which the user is presented with a question or other task whose successful completion helps to determine their identity.
checksum
A number used to check the integrity of a message.
cipher
A code, a means of encrypting plaintext.
ciphertext
The output of a cipher.
click fraud
The fraudulent generation of clicks in order to profit from cost-per-click web pages.
code base
The location of code in terms of its URL.
collision
A collision occurs in a hash function when two or more inputs generate the same output.
confidentiality
The property of a system that ensures that data is visible only to authorised users.
credentials
Security information associated with a subject, such as keys or passwords.
cryptanalysis
The science of decoding ciphers.
cryptographic hash function
A hash function with desirable properties for
applications in security.
cryptographic service
A cryptographic facility provided by implementers of services
for Java’s cryptography API, such as ciphers, message digests and digital signing.
cryptography
The science of ciphering.
deciphering (decryption)
Converting ciphertext to plaintext.
declarative security
Using an XML deployment descriptor file to delegate authorisation checks to a container.
digital certificate
An electronic means of associating a user with a key.
digital signature
An electronic means of signing a communication.
digitally signed
Having an electronic signature.
domain
A set of classes with the same permissions.
end-to-end encryption
An approach to network security in which the sending and receiving nodes of a message implement encryption and decryption using a shared key.
exponential
Growing according to an exponential relationship; that is, according to a power of a number.
fabrication
The construction of false or unauthorised information.
firewall
A technology to filter internet traffic between a local and external network.
group
A collection of authenticated users.
hacker
An unauthorised user of a system.
handshake
An exchange of information to establish parameters for communication.
hash function
A one-way function that maps an input to a small output.
hierarchy of trust
The relationship in which one or more parties place trust in other parties to perform authentication.
homograph attack
An attack using social engineering in which a name similar to another is used to try to deceive a user.
integrity
The property of information that it has not been altered by an attacker or otherwise corrupted.
interception
Access of information by an unauthorised user.